josh0xA / Espionage
A Linux Packet Sniffing Suite for Automated MiTM Attacks
☆218Updated last month
Related projects: ⓘ
- Automated rogue access point setup tool.☆190Updated 3 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 4 years ago
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆265Updated last year
- A simple wordlists generator and mangler written in Python 3.10.1.☆116Updated 8 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆188Updated 2 years ago
- Web Application Vulnerability Scanner☆122Updated 3 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆134Updated 4 years ago
- Perform automated network reconnaissance scans☆216Updated last year
- Ultimate Recon Software for Information Gathering☆92Updated 4 years ago
- Customized Password/Passphrase List inputting Target Info☆80Updated 9 months ago
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆84Updated 4 years ago
- ☆132Updated last year
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆224Updated 2 years ago
- Zero Infrastructure Password Cracking☆389Updated 3 weeks ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆211Updated 2 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆104Updated last year
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆161Updated last year
- Python Gmail User Enumeration Tool☆112Updated 2 years ago
- 🛅 Passwords using personal information☆79Updated 4 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆265Updated last month
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆355Updated last year
- PhishX - The Complete Spear Phishing Tool☆89Updated 6 years ago
- GUI based offensive penetration testing tool (Open Source)☆207Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆43Updated 3 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆123Updated 11 months ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆84Updated last year
- Find exploits in local and online database☆69Updated 3 months ago
- An automated Wireless RogueAP MITM attack framework.☆172Updated 5 years ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆361Updated 9 months ago
- Hide your payload into .jpg file☆384Updated 2 years ago