iknowjason / voiphopper
VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security tool. A tool to test for the (in)security of VLANS. It can mimic the behavior of IP Phones to better understand business risks within an IP Telephony network infrastructure. VoIP Hopper is included in Kali Lβ¦
β70Updated last year
Alternatives and similar repositories for voiphopper:
Users that are interested in voiphopper are comparing it to the libraries listed below
- Wireless Pentesting Deviceβ20Updated 4 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)β47Updated 2 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwordsβ23Updated 6 years ago
- Custom pentesting toolsβ25Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCMβ101Updated 5 years ago
- Merge multiple nMap xml files into oneβ50Updated 5 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashesβ30Updated last year
- Small python script wrapper for automating hashcat commandsβ37Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.β23Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of β¦β73Updated 4 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csvβ39Updated last year
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations andβ¦β14Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characteβ¦β25Updated 5 years ago
- A tool to assist in the development of landing pages for phishing campaignsβ15Updated 2 years ago
- SMBScan is a tool to enumerate file shares on an internal network.β44Updated last week
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicatedβ¦β24Updated 2 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Securityβ69Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and Aβ¦β19Updated last year
- Penetration Testing with Kali Linuxβ22Updated 5 years ago
- β19Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.β20Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Updated 3 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.β18Updated 5 years ago
- Create visualization from Shodan queryβ72Updated 3 years ago
- WordPress version identification and vulnerability finder.β30Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the sβ¦β17Updated 3 years ago
- Extract credentials and other useful info from network capturesβ68Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.β98Updated 5 years ago
- Convert Nmap output for integration with other Project Discovery toolsβ15Updated 2 years ago