koutto / pi-pwnbox-rogueapLinks
Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap
☆1,985Updated last year
Alternatives and similar repositories for pi-pwnbox-rogueap
Users that are interested in pi-pwnbox-rogueap are comparing it to the libraries listed below
Sorting:
- All In One Web Recon☆2,623Updated 8 months ago
- Wi-Fi Exploitation Framework☆2,753Updated 4 months ago
- CrackQ: A Python Hashcat cracking queue system☆941Updated last year
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,255Updated 3 months ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,519Updated 7 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,886Updated 2 years ago
- Update Version 3.1 added free SMS messaging.☆498Updated 3 years ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆1,083Updated 3 weeks ago
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,235Updated 6 months ago
- Transparent proxy through Tor for Kali Linux OS☆1,189Updated last year
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆380Updated 4 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,569Updated 2 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,392Updated 10 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,585Updated 2 months ago
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial …☆1,475Updated 4 years ago
- WiFi Penetration Testing Guide☆656Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,746Updated last month
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,892Updated 2 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,921Updated 3 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,440Updated last year
- The all-in-one browser extension for offensive security professionals 🛠☆6,495Updated last year
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,069Updated last year
- All MITM attacks in one place.☆1,017Updated 4 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,626Updated last month
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information abo…☆1,695Updated 6 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,495Updated 7 months ago
- Search for leaked credentials☆1,372Updated 4 years ago
- Generates millions of keyword-based password mutations in seconds.☆1,400Updated 7 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,789Updated 3 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,094Updated 2 weeks ago