g13net / PwnBerryPi
☆52Updated 12 years ago
Alternatives and similar repositories for PwnBerryPi
Users that are interested in PwnBerryPi are comparing it to the libraries listed below
Sorting:
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- Useful pentesting scripts☆83Updated 3 months ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- Pentest dropbox setup scripts for Kali Linux☆89Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- WPS scan and pwn tool☆67Updated 5 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 10 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆85Updated 7 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- giskismet – Wireless recon visualization tool☆53Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 3 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆46Updated 8 years ago
- Unofficial Kali Documentation Project☆161Updated 10 years ago
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Updated 9 years ago
- Black Nurse DOS attack☆72Updated 7 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago