evilsocket / arc
A manager for your secrets.
☆939Updated 6 months ago
Alternatives and similar repositories for arc:
Users that are interested in arc are comparing it to the libraries listed below
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆576Updated 6 months ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,577Updated 4 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,224Updated 6 months ago
- A framework for wireless pentesting.☆1,199Updated 4 years ago
- caplets and proxy modules.☆486Updated 2 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 3 months ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 5 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆445Updated 6 years ago
- bettercap's web UI☆326Updated 2 months ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆821Updated 4 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆405Updated last year
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆578Updated 7 years ago
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,660Updated last year
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,212Updated 3 years ago
- Modern tactical exploitation toolkit.☆841Updated 6 months ago
- USB key cleaner☆455Updated last year
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,599Updated 2 months ago
- A web front-end for password cracking and analytics☆623Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆595Updated 7 months ago
- WarBerryPi - Tactical Exploitation☆2,223Updated 5 years ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆489Updated 7 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆693Updated 11 months ago
- A mostly-serverless distributed hash cracking platform☆800Updated 9 months ago
- 📡 A python program to create a fake AP and sniff data.☆1,665Updated 5 years ago
- Build interactive map of cameras from Shodan☆1,252Updated 4 years ago
- Create multiple TOR instances with a load-balancing.☆1,074Updated 2 months ago
- Prevent RubberDucky (or other keystroke injection) attacks☆521Updated 10 months ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,682Updated 6 months ago
- Network Defense System.☆1,456Updated 3 weeks ago