kimocoder / OneShotLinks
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
☆159Updated last month
Alternatives and similar repositories for OneShot
Users that are interested in OneShot are comparing it to the libraries listed below
Sorting:
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆86Updated 2 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆85Updated last month
- A tool for automatically change the Tor IP address over time.☆88Updated 2 months ago
- Repo containing cracked red teaming tools.☆178Updated last month
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆62Updated 4 years ago
- A free SSH KaliLinux server (Segfault) without limited time,You can use this for test any tool or using kali linux tools or anything else…☆80Updated 2 weeks ago
- Automation of the wireless network auditor, "wifite"☆70Updated 3 weeks ago
- Install Burpsuite pro in Linux OS☆14Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆37Updated this week
- Here are the most interesting Shodan dorks (according to me)☆81Updated last year
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆31Updated 5 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆177Updated 10 months ago
- Welcome To Parrot Termux For Android☆39Updated 5 months ago
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆24Updated 11 months ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆31Updated 3 months ago
- automate wifi hacking with wicker☆57Updated last year
- The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)☆66Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆191Updated 3 months ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆66Updated 2 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆170Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- Automatic tool to find Google Dorks☆36Updated 8 months ago
- Chiasmodon Mobile - OSINT Tool for Domain Information Gathering on Android.☆15Updated last year
- Making your own CTF☆26Updated 4 years ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆31Updated last week
- RDPTown: Get your own free Linux RDP or virtual computer on Google Cloud, with just a Google account!☆46Updated last month
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 9 months ago
- Nessus Professional Latest☆30Updated last year
- Automated exploit scanner for cameras on the internet☆195Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆107Updated 6 months ago