freqyXin / Offensive-Wireless-SecurityView external linksLinks
Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation
☆13Aug 16, 2022Updated 3 years ago
Alternatives and similar repositories for Offensive-Wireless-Security
Users that are interested in Offensive-Wireless-Security are comparing it to the libraries listed below
Sorting:
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 2 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 6 years ago
- A lockout aware password sprayer☆15Jan 6, 2022Updated 4 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- ☆22Mar 1, 2022Updated 3 years ago
- Cybersecurity Architects Handbook, published by Packt☆26Mar 27, 2024Updated last year
- ☆11Feb 14, 2023Updated 2 years ago
- Ingest openldap data into bloodhound☆81Apr 1, 2021Updated 4 years ago
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆83Dec 18, 2025Updated last month
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- PwnWiki - The notes section of the pentesters mind.☆27May 20, 2014Updated 11 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- Docker images for learning wifi hacking☆69Oct 26, 2018Updated 7 years ago
- A small script to automate project folder management and basic tool output☆34May 14, 2020Updated 5 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆40Mar 25, 2024Updated last year
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago
- Fractals using Python 3☆10Apr 9, 2021Updated 4 years ago
- ☆11Oct 17, 2024Updated last year
- Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create…☆14Jul 30, 2022Updated 3 years ago
- PowerCLI Scripts☆14Aug 10, 2019Updated 6 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Oct 31, 2025Updated 3 months ago
- Monte Carlo password checking☆11Aug 14, 2017Updated 8 years ago
- ☆16May 13, 2021Updated 4 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Mar 14, 2019Updated 6 years ago
- Microsoft Exchange password spray tool with proxy support.☆39Jul 9, 2021Updated 4 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- ☆14Dec 6, 2023Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- A repo that contains a recursive dump from the ROOT key of every Windows Registry hive (using KAPE) from a vanilla (clean) install of eve…☆54Oct 29, 2025Updated 3 months ago
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated 10 months ago
- Javascript Slippy Map Library☆14Sep 25, 2017Updated 8 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago