intercepting kali router
☆443Aug 31, 2017Updated 8 years ago
Alternatives and similar repositories for kalirouter
Users that are interested in kalirouter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework for wireless pentesting.☆1,234Oct 14, 2020Updated 5 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆322Aug 20, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- PowerDNS: Powershell DNS Delivery☆217Sep 26, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 9 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆510Apr 22, 2018Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,689Nov 3, 2019Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Feb 19, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python / C# Unmanaged PowerShell based RAT☆774Mar 29, 2023Updated 3 years ago
- Email recon made fast and easy, with a framework to build on☆955Jan 12, 2023Updated 3 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,460Nov 3, 2018Updated 7 years ago
- online port scan scraper☆1,121Aug 7, 2023Updated 2 years ago
- Vulnerability scanner based on vulners.com search API☆888Oct 1, 2025Updated 6 months ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆444Jul 11, 2017Updated 8 years ago
- A framework for Backdoor development!☆435Mar 18, 2018Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Some usefull scripts for KaliLinux☆474Aug 26, 2022Updated 3 years ago
- Encrypted exploit delivery for the masses☆271Sep 25, 2019Updated 6 years ago
- ☆138Jul 13, 2017Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,390Jun 17, 2022Updated 3 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,220Feb 6, 2022Updated 4 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆244Sep 13, 2021Updated 4 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆468Sep 23, 2017Updated 8 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆460Apr 3, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Jan 24, 2016Updated 10 years ago
- Modern tactical exploitation toolkit.☆859Mar 9, 2026Updated last month
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Run Kali tools on all distributions. Offline search, including in package descriptions.☆110Jan 20, 2018Updated 8 years ago
- A ton of helpful tools☆345Oct 8, 2021Updated 4 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago