iknowjason / voiphopperLinks
VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security tool. A tool to test for the (in)security of VLANS. It can mimic the behavior of IP Phones to better understand business risks within an IP Telephony network infrastructure. VoIP Hopper is included in Kali L…
☆70Updated last year
Alternatives and similar repositories for voiphopper
Users that are interested in voiphopper are comparing it to the libraries listed below
Sorting:
- Extract credentials and other useful info from network captures☆69Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103Updated 6 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Fly into Gophish with One Click (Infra Automation)☆49Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated 10 months ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- A stand-alone implementation of Hashcat's rule engine☆34Updated 8 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Wireless Pentesting Device☆21Updated 4 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 5 years ago
- SMBScan is a tool to enumerate file shares on an internal network.☆45Updated this week
- Collection of extra pentest tools for Kali Linux☆105Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 7 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Brute-force Cisco SSL VPN☆57Updated 5 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- ☆48Updated 5 months ago