justinbeatz / ArmoryView external linksLinks
The 802.11 Hacking Repo.
☆41Aug 10, 2015Updated 10 years ago
Alternatives and similar repositories for Armory
Users that are interested in Armory are comparing it to the libraries listed below
Sorting:
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- A script for 802.11 mass-deauthentication☆29Jul 2, 2014Updated 11 years ago
- Image factory for the IONOS customers images☆15May 4, 2022Updated 3 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A collection of awesome resources related to 802.11 security, tools and other things☆170Apr 10, 2019Updated 6 years ago
- My own tools for easing the task of pentesting / exploit writing☆49Oct 21, 2014Updated 11 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- A collection of mobile networking tools and resources for the UK and the rest of the world.☆14Feb 4, 2026Updated last week
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆32Apr 8, 2019Updated 6 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- A python web application compliment to py80211 which allows you to visualize the airwaves around you with your web browser.☆16Jun 19, 2014Updated 11 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- NoSQL Injection Demo Application☆13Oct 18, 2013Updated 12 years ago
- Hack-camera is a tool used to carry out attacks using social engineering, namely sending a trap link to trap the target and taking photos…☆17Dec 24, 2025Updated last month
- NSA headline generator☆32Feb 11, 2014Updated 12 years ago
- cenarius tool for crack Wi-Fi , crack wpa-psk , crack wpa2-psk , crack wep , crack wps pin and crack hidden AP . cenarius psk crack☆31May 9, 2016Updated 9 years ago
- A program with a nice UI that downloads OnlyFans content.☆16Nov 20, 2020Updated 5 years ago
- ☆16Dec 13, 2022Updated 3 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- pwnig all the (web)things☆21Nov 21, 2020Updated 5 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- A (very basic) steganographic device, for encoding a payload into an image☆24Sep 23, 2015Updated 10 years ago
- ☆25Aug 20, 2021Updated 4 years ago
- Tools for 802.11 information gathering.☆119May 9, 2022Updated 3 years ago
- Android 802.11 pentesting tool☆96May 3, 2014Updated 11 years ago
- a 802.11 wireless fuzzer☆93Jan 25, 2013Updated 13 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- Automated System Hardening (ash-windows) is a Salt formula to apply SCAP benchmarks to Windows systems☆20Jan 12, 2026Updated last month
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago