iknowjason / voiphopper
VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security tool. A tool to test for the (in)security of VLANS. It can mimic the behavior of IP Phones to better understand business risks within an IP Telephony network infrastructure. VoIP Hopper is included in Kali L…
☆68Updated last year
Alternatives and similar repositories for voiphopper:
Users that are interested in voiphopper are comparing it to the libraries listed below
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆101Updated 5 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 2 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Various scripts and codes☆83Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- ☆34Updated last week
- Random Hashcat Scrips☆24Updated 3 months ago
- Files for my Python3 Create Your Own Tool Series☆24Updated 2 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆23Updated 2 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆26Updated 6 months ago
- Extract credentials and other useful info from network captures☆65Updated 2 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆68Updated 2 years ago
- Hashes of infamous malware☆25Updated last year
- Automated 802.1x Bypass☆85Updated 4 years ago
- WordPress version identification and vulnerability finder.☆28Updated 2 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 2 months ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- ☆12Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Custom pentesting tools☆24Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago