haxrob / wedgeberryLinks
Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support
☆29Updated last year
Alternatives and similar repositories for wedgeberry
Users that are interested in wedgeberry are comparing it to the libraries listed below
Sorting:
- Script to perform some hashcracking logic automagically☆78Updated last week
- OSDP attack tool (and the Elvish word for friend)☆105Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated 2 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆73Updated 2 weeks ago
- Bluetooth Security Assessment Methodology☆139Updated last year
- Tail Certificate Transparency logs and extract hostnames☆124Updated 5 months ago
- Generate graphs and charts based on password cracking result☆164Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆50Updated 10 months ago
- Team hashcat event writeups and tools☆51Updated 3 months ago
- ☆54Updated 2 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆16Updated last year
- Next generation fireprox AWS API endpoint creation utility.☆56Updated 2 years ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆70Updated 11 months ago
- Fast website scraper and wordlist generator☆81Updated 6 months ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆111Updated 2 years ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆114Updated 3 months ago
- Interactive results explorer and annotation tool for Nosey Parker☆41Updated 4 months ago
- ☆42Updated last year
- Legba recipes.☆51Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year
- tool for identifying guest relationships between companies☆103Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆218Updated last year
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆34Updated 8 months ago
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆82Updated 3 months ago
- ☆12Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Living Off Security Tools☆52Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆55Updated last month