hash3liZer / airpydumpLinks
Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)
☆51Updated 7 years ago
Alternatives and similar repositories for airpydump
Users that are interested in airpydump are comparing it to the libraries listed below
Sorting:
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- ☆19Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- ☆24Updated 9 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- pentest toolbox☆28Updated 2 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- MS17-010☆12Updated 7 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆22Updated 7 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago