Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap
☆2,000Mar 13, 2024Updated 2 years ago
Alternatives and similar repositories for pi-pwnbox-rogueap
Users that are interested in pi-pwnbox-rogueap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,549Jan 18, 2026Updated 2 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,701Jul 6, 2025Updated 8 months ago
- Personal notes used to pass the OSWP exam☆94Aug 10, 2022Updated 3 years ago
- 🕵️♂️ Offensive Google framework.☆18,608Mar 14, 2026Updated 2 weeks ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,668Jan 5, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,303Jun 1, 2023Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,202Sep 29, 2025Updated 6 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,652Aug 28, 2025Updated 7 months ago
- A swiss army knife for pentesting networks☆9,108Dec 6, 2023Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,442Mar 16, 2026Updated last week
- Update Version 3.1 added free SMS messaging.☆499Feb 4, 2022Updated 4 years ago
- This is meant to assist people looking for entry level Cybersecurity jobs, as well as study up on skills that they can put on their resum…☆1,336Nov 5, 2025Updated 4 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,649Jul 18, 2024Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,476Sep 22, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- Dumping DPAPI credz remotely☆1,348Mar 24, 2025Updated last year
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,918Jun 27, 2023Updated 2 years ago
- game of active directory☆7,610Mar 12, 2026Updated 2 weeks ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,092Feb 25, 2026Updated last month
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,759Feb 27, 2026Updated last month
- A Raspberry Pi Hacker Tools suite☆184Aug 27, 2024Updated last year
- Attack Surface Management Platform☆9,622Feb 15, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,371Mar 20, 2026Updated last week
- Tools and Techniques for Red Team / Penetration Testing☆8,608Mar 18, 2025Updated last year
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,453Mar 1, 2024Updated 2 years ago
- WiFi Penetration Testing Guide☆690Dec 14, 2023Updated 2 years ago
- Infection Monkey - An open-source adversary emulation platform☆6,979May 1, 2025Updated 10 months ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,631Jun 20, 2024Updated last year
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,477Dec 12, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,465Oct 1, 2025Updated 5 months ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,586Mar 11, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PowerShell MachineAccountQuota and DNS exploit tools☆1,449Jan 11, 2023Updated 3 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,161Mar 8, 2026Updated 3 weeks ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,522Mar 21, 2026Updated last week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,901Oct 29, 2025Updated 5 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,520Aug 22, 2024Updated last year
- Windows Privilege Escalation from User to Domain Admin.☆1,453Dec 18, 2022Updated 3 years ago