Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation
☆13Aug 16, 2022Updated 3 years ago
Alternatives and similar repositories for Offensive-Wireless-Security
Users that are interested in Offensive-Wireless-Security are comparing it to the libraries listed below
Sorting:
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- A lockout aware password sprayer☆15Jan 6, 2022Updated 4 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- ☆22Mar 1, 2022Updated 4 years ago
- Cybersecurity Architects Handbook, published by Packt☆27Mar 27, 2024Updated last year
- ☆11Feb 14, 2023Updated 3 years ago
- Ingest openldap data into bloodhound☆79Apr 1, 2021Updated 4 years ago
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆84Updated this week
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 5 months ago
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- PwnWiki - The notes section of the pentesters mind.☆27May 20, 2014Updated 11 years ago
- Docker images for learning wifi hacking☆69Oct 26, 2018Updated 7 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Mar 25, 2024Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- A small script to automate project folder management and basic tool output☆34May 14, 2020Updated 5 years ago
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- ☆16May 13, 2021Updated 4 years ago
- Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create…☆16Jul 30, 2022Updated 3 years ago
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Oct 31, 2025Updated 4 months ago
- PowerCLI Scripts☆14Aug 10, 2019Updated 6 years ago
- Fractals using Python 3☆10Apr 9, 2021Updated 4 years ago
- ☆11Oct 17, 2024Updated last year
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Monte Carlo password checking☆11Aug 14, 2017Updated 8 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Mar 14, 2019Updated 6 years ago
- Microsoft Exchange password spray tool with proxy support.☆39Jul 9, 2021Updated 4 years ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- TOTP for php (https://tools.ietf.org/html/rfc6238)☆12Jan 6, 2023Updated 3 years ago
- ☆12Nov 11, 2025Updated 3 months ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- ☆10Feb 8, 2021Updated 5 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- StackStorm pack with action aliases allowing to run Ansible in a ChatOps way☆10Feb 21, 2017Updated 9 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago
- ☆16Sep 6, 2017Updated 8 years ago