koniu / wassupLinks
WAyereless Site SUrveying Program
☆12Updated 9 years ago
Alternatives and similar repositories for wassup
Users that are interested in wassup are comparing it to the libraries listed below
Sorting:
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 10 years ago
- ANWI - All New Wireless IDS☆28Updated last week
- Shell script to create an onion-router for your Raspberry Pi from a stock Moebius image☆28Updated 11 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆60Updated 6 years ago
- DHCP option injector☆42Updated 5 years ago
- Payloads for the Hak5 Bash Bunny☆11Updated 8 years ago
- all things awesome security☆14Updated 9 years ago
- netgrafio - Visualize your network☆327Updated 11 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Updated 10 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆107Updated 11 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Packet-o-matic NG !☆64Updated 5 months ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- ☆56Updated 8 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Password analysis software☆37Updated 10 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- disthc☆28Updated 11 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 12 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago