jesusprubio / bluebox
Pentesting framework using Node.js powers, focused in VoIP.
☆261Updated 7 years ago
Alternatives and similar repositories for bluebox:
Users that are interested in bluebox are comparing it to the libraries listed below
- VIPROY - VoIP Pen-Test Kit for Metasploit Framework☆411Updated 3 years ago
- VOIP Security Audit Framework☆108Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆123Updated 6 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆197Updated 8 years ago
- Various Cheat Sheets related to development and security☆143Updated 4 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- Stargate☆94Updated 8 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆56Updated 9 years ago
- An automated SMB relay exploitation script.☆154Updated 8 years ago
- Rogue AP killer☆89Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- Shodan HQ nmap plugin - passively scan targets☆153Updated 9 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 8 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 5 years ago
- Cartero - Social Engineering Framework☆171Updated 4 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆68Updated 9 years ago
- Universal MITM web server☆107Updated 7 years ago
- ☆78Updated 9 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆225Updated 9 years ago
- SCTP network scanner for discovery and security☆93Updated 3 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Detect and prevent KRACK attacks in your network☆181Updated 7 years ago
- Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!☆231Updated 4 years ago
- Web Sight Docker Deployment☆124Updated 7 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆166Updated 7 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆115Updated 4 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago