iknowjason / voiphopper
VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security tool. A tool to test for the (in)security of VLANS. It can mimic the behavior of IP Phones to better understand business risks within an IP Telephony network infrastructure. VoIP Hopper is included in Kali L…
☆67Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for voiphopper
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆100Updated 5 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆96Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆46Updated last year
- ☆11Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- WordPress version identification and vulnerability finder.☆28Updated 2 years ago
- Extract credentials and other useful info from network captures☆63Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆17Updated 5 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- ☆34Updated 6 years ago
- Simple Nmap XML parsing script. Doesn't do anything fancy☆20Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- ☆36Updated 2 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 7 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- repository containing some nmap scripts☆11Updated 3 years ago
- Automated 802.1x Bypass☆84Updated 4 years ago
- ☆21Updated last year
- Merge multiple nMap xml files into one☆49Updated 5 years ago
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆14Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- A library that scrapes Linkedin for user data☆22Updated 3 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆28Updated 2 weeks ago