kimocoder / OneShot
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
☆136Updated 11 months ago
Alternatives and similar repositories for OneShot:
Users that are interested in OneShot are comparing it to the libraries listed below
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆81Updated 2 years ago
- Here are the most interesting Shodan dorks (according to me)☆75Updated last year
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆72Updated last week
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆77Updated last month
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆45Updated 2 years ago
- Repo containing cracked red teaming tools.☆159Updated 3 weeks ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated last week
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆166Updated 9 months ago
- Automated exploit scanner for cameras on the internet☆189Updated last year
- IoT Camera Reconnaissance and Live Viewer☆138Updated 8 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆114Updated 8 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 6 months ago
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆23Updated 8 months ago
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆29Updated 4 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 6 months ago
- Kali Packerge Manager☆59Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆57Updated 7 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆171Updated 8 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆59Updated 4 years ago
- ☆8Updated 8 months ago
- Nessus is one of the many vulnerability scanners used during vulnerability assessments☆95Updated 2 years ago
- Welcome To Parrot Termux For Android☆37Updated 2 months ago
- Evora is the best AI personal assistant bot in the field of ethical hacking and penetration testing. She has a high level of accuracy and…☆77Updated 5 months ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆78Updated 8 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆242Updated 6 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆132Updated 5 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- Making your own CTF☆26Updated 4 years ago
- ☆21Updated 2 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆96Updated 4 months ago