josh0xA / EspionageView external linksLinks
A Linux Packet Sniffing Suite for Automated MiTM Attacks
☆244Aug 14, 2024Updated last year
Alternatives and similar repositories for Espionage
Users that are interested in Espionage are comparing it to the libraries listed below
Sorting:
- Wi-Fi Exploit Tool☆51May 23, 2020Updated 5 years ago
- A simple script to generate a hidden url for social engineering.☆122Aug 11, 2020Updated 5 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Sep 13, 2021Updated 4 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆144Jul 12, 2020Updated 5 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Open Source Intelligence Interface for Deep Web Scraping☆1,523Dec 29, 2025Updated last month
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Dec 22, 2021Updated 4 years ago
- Open source pre-operation C2 server based on python and powershell☆761Jul 6, 2021Updated 4 years ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Assist reverse tcp shells in post-exploration tasks☆219Oct 17, 2025Updated 3 months ago
- A email OSINT tool written in python3☆20Nov 26, 2022Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- A WLAN red team framework.☆155Updated this week
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Aug 8, 2024Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Jun 3, 2021Updated 4 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,067Jan 15, 2021Updated 5 years ago
- IoT Camera Reconnaissance and Live Viewer☆171Jul 30, 2024Updated last year
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆240Jul 3, 2024Updated last year
- Hide cool stuff in images :)☆145Aug 9, 2020Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Jul 6, 2024Updated last year
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆51Feb 5, 2025Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Feb 20, 2024Updated last year
- Drone pentesting framework console☆1,744Nov 23, 2024Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Mar 15, 2024Updated last year
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆221Mar 22, 2020Updated 5 years ago
- fully automated pentesting tool☆518Dec 8, 2022Updated 3 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25May 30, 2022Updated 3 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆178Apr 25, 2020Updated 5 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆244Dec 10, 2020Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆33Dec 18, 2019Updated 6 years ago