Extract Windows Wi-Fi Passwords to Remote URL
☆279Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for Windows-WiFi-Extractor
Users that are interested in Windows-WiFi-Extractor are comparing it to the libraries listed below
Sorting:
- ☆11Jan 7, 2022Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- ☆28Apr 9, 2020Updated 5 years ago
- ☆432Feb 2, 2022Updated 4 years ago
- ☆81May 4, 2020Updated 5 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆16Apr 18, 2017Updated 8 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Oct 31, 2023Updated 2 years ago
- Same Pentest Resume☆143Mar 12, 2020Updated 5 years ago
- Sample pentest report provided by TCM Security☆1,332Mar 18, 2022Updated 3 years ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆261Jul 2, 2025Updated 8 months ago
- FAQ Guide for Practical Ethical Hacking Udemy Course☆189Apr 26, 2020Updated 5 years ago
- Violent Python scripts used in book and few other required files☆66Oct 21, 2018Updated 7 years ago
- List of advanced XSS payloads☆86Aug 23, 2016Updated 9 years ago
- Python Gmail User Enumeration Tool☆16Jul 13, 2025Updated 7 months ago
- A tool for parsing breached passwords☆2,093Mar 21, 2024Updated last year
- Python3 o365 User Enumeration Tool☆567Jan 28, 2026Updated last month
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆10Apr 25, 2021Updated 4 years ago
- MayorSec DNS Enumeration Tool☆90Nov 30, 2024Updated last year
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- ☆16Aug 2, 2025Updated 7 months ago
- A quick script to install google on linux☆22Jan 23, 2022Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- ☆18Aug 31, 2023Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- Automated solution for nmap'ing☆27May 17, 2023Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Jul 19, 2024Updated last year
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,056Dec 11, 2024Updated last year
- PNPT Exam Preparation - TCM Security☆171Jul 25, 2021Updated 4 years ago
- Course repository for PowerShell for Pentesters Course☆439Mar 9, 2022Updated 3 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,396Jun 30, 2025Updated 8 months ago
- Google Dork File Finder☆197Jan 6, 2025Updated last year
- ☆413Dec 14, 2023Updated 2 years ago
- Falcon Integration Gateway (FIG)☆23Updated this week
- ☆1,073May 18, 2024Updated last year
- Penguin OS Forensic (or Flight) Recorder☆40Dec 25, 2024Updated last year
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆488Nov 21, 2024Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,197Oct 6, 2025Updated 5 months ago