iknowjason / voiphopperLinks
VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security tool. A tool to test for the (in)security of VLANS. It can mimic the behavior of IP Phones to better understand business risks within an IP Telephony network infrastructure. VoIP Hopper is included in Kali L…
☆70Updated last year
Alternatives and similar repositories for voiphopper
Users that are interested in voiphopper are comparing it to the libraries listed below
Sorting:
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103Updated 6 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆31Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Wireless Pentesting Device☆22Updated 4 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- ☆33Updated 5 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Custom pentesting tools☆25Updated 4 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Various scripts and codes☆84Updated 4 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated 11 months ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- recon-ng modules for Censys☆37Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆61Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Fly into Gophish with One Click (Infra Automation)☆49Updated 2 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- ☆48Updated 6 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- SMBScan is a tool to enumerate file shares on an internal network.☆45Updated this week
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago