kimocoder / OneShot
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
☆141Updated last year
Alternatives and similar repositories for OneShot:
Users that are interested in OneShot are comparing it to the libraries listed below
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆82Updated 2 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆79Updated 2 months ago
- Install Burpsuite pro in Linux OS☆14Updated last year
- A free SSH KaliLinux server (Segfault) without limited time,You can use this for test any tool or using kali linux tools or anything else…☆74Updated 5 months ago
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆28Updated 4 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆61Updated 4 years ago
- TorNet is a Python package that automates IP address changes using Tor. It is a top tool for securing your networks by frequently changin…☆44Updated 10 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆173Updated 8 months ago
- Here are the most interesting Shodan dorks (according to me)☆77Updated last year
- Run WPS PIN attacks (Pixie Dust and bruteforce) on your Termux☆42Updated last month
- A tool for automatically change the Tor IP address over time.☆79Updated 2 weeks ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆167Updated 10 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 7 months ago
- Automated exploit scanner for cameras on the internet☆190Updated last year
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆23Updated 8 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆185Updated 3 weeks ago
- ☆21Updated 2 years ago
- The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)☆63Updated 10 months ago
- Nuclei (https://github.com/projectdiscovery/nuclei) templates for extracting juicy info from web pages☆179Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆92Updated last year
- HackBar is a security audit tool that will enable you to pentest websites more easily. ... You can use it to check site security by perfo…☆137Updated 4 years ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated last month
- WPS pin generator written in Python 3☆46Updated 4 years ago
- automate wifi hacking with wicker☆54Updated 9 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 7 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆134Updated 6 months ago
- A simple application that will help you determine the usb device. It will be useful when choosing an adapter as it displays the chipset!☆54Updated last year
- Kali Packerge Manager☆59Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆70Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆59Updated last week