evilsocket / arc
A manager for your secrets.
☆919Updated 2 months ago
Related projects: ⓘ
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆535Updated 2 years ago
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆564Updated 2 months ago
- A framework for wireless pentesting.☆1,190Updated 3 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,093Updated 5 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,189Updated 2 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆348Updated 2 years ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆819Updated 3 years ago
- SSH man-in-the-middle tool☆1,609Updated 3 years ago
- JackIt - Exploit Code for Mousejack☆802Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,529Updated 3 years ago
- caplets and proxy modules.☆480Updated 6 months ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆573Updated 6 years ago
- A mostly-serverless distributed hash cracking platform☆792Updated 5 months ago
- bettercap's web UI☆315Updated last week
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,623Updated 8 months ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,083Updated 6 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆665Updated 7 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,565Updated last year
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,677Updated 2 years ago
- ☆1,759Updated this week
- A Software Defined Radio Attack Tool☆516Updated 7 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,100Updated 5 months ago
- Build interactive map of cameras from Shodan☆1,244Updated 4 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆434Updated 6 years ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆471Updated 6 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,649Updated last month
- 📡 A python program to create a fake AP and sniff data.☆1,655Updated 4 years ago
- Tracking history of USB events on GNU/Linux☆1,154Updated last year
- wide range mass audit toolkit☆979Updated 5 years ago
- 🧠 A tool that makes AI easier.☆294Updated 3 months ago