kimocoder / OneShot
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
☆131Updated 10 months ago
Alternatives and similar repositories for OneShot:
Users that are interested in OneShot are comparing it to the libraries listed below
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆80Updated 2 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆71Updated this week
- Install Burpsuite pro in Linux OS☆14Updated 10 months ago
- Here are the most interesting Shodan dorks (according to me)☆75Updated last year
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆23Updated 6 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆109Updated 8 years ago
- TorNet is a Python package that automates IP address changes using Tor. It is a top tool for securing your networks by frequently changin…☆32Updated 8 months ago
- A free SSH KaliLinux server (Segfault) without limited time,You can use this for test any tool or using kali linux tools or anything else…☆62Updated 2 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆132Updated 4 months ago
- Making your own CTF☆25Updated 4 years ago
- Automation of the wireless network auditor, "wifite"☆64Updated last month
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆239Updated 5 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 5 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆54Updated 4 years ago
- Nessus is one of the many vulnerability scanners used during vulnerability assessments☆92Updated 2 years ago
- Some Useful Tricks for Pentest Android and iOS Apps☆92Updated 2 months ago
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆27Updated 4 years ago
- 😁 BurpSuite Pro Auto Installation Script For Linux And Windows! 👍☆18Updated 4 years ago
- A powerful tool to scan CRLF vulnerability written in Python☆13Updated last year
- tricks I discovered while playing king of the hill☆13Updated last year
- Automate installation of extra pentest tools on Kali Linux☆51Updated 3 years ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆51Updated last week
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆162Updated 8 months ago
- List of payloads: reverse shell, bind shell, webshell.☆30Updated last year
- Welcome To Parrot Termux For Android☆36Updated last month
- Automated exploit scanner for cameras on the internet☆180Updated 10 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆102Updated last month
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 5 months ago
- PEN-103-Kali-Linux-Revealed-KLR-Cheat-Sheet☆19Updated 4 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆166Updated 7 months ago