iknowjason / voiphopper
VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security tool. A tool to test for the (in)security of VLANS. It can mimic the behavior of IP Phones to better understand business risks within an IP Telephony network infrastructure. VoIP Hopper is included in Kali L…
☆70Updated last year
Alternatives and similar repositories for voiphopper
Users that are interested in voiphopper are comparing it to the libraries listed below
Sorting:
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Extract credentials and other useful info from network captures☆68Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆48Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Wireless Pentesting Device☆21Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 6 months ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated 9 months ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 5 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆15Updated 5 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 8 months ago
- Automated 802.1x Bypass☆83Updated 5 years ago
- Docker images for learning wifi hacking☆66Updated 6 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- SMBScan is a tool to enumerate file shares on an internal network.☆45Updated last month
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆14Updated 6 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated 7 months ago