iknowjason / voiphopperLinks
VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security tool. A tool to test for the (in)security of VLANS. It can mimic the behavior of IP Phones to better understand business risks within an IP Telephony network infrastructure. VoIP Hopper is included in Kali L…
☆72Updated last year
Alternatives and similar repositories for voiphopper
Users that are interested in voiphopper are comparing it to the libraries listed below
Sorting:
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- Various scripts and codes☆85Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆27Updated 2 years ago
- Commands used in Windows penetration tests☆54Updated last week
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆63Updated 4 years ago
- A WLAN red team framework.☆154Updated last year
- recon-ng modules for Censys☆38Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Extract credentials and other useful info from network captures☆72Updated 2 years ago
- A Burp Pro extension that adds log4shell checks to Burp Scanner.☆27Updated 3 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last week
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated 11 months ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated 2 years ago