koutto / pi-pwnbox-rogueap
Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap
☆1,742Updated 10 months ago
Alternatives and similar repositories for pi-pwnbox-rogueap:
Users that are interested in pi-pwnbox-rogueap are comparing it to the libraries listed below
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,242Updated 4 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,753Updated 8 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,275Updated last month
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,628Updated last year
- 🐧 Abuse of Google Colab for cracking hashes.☆934Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,816Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆2,924Updated 3 weeks ago
- All In One Web Recon☆2,345Updated 2 months ago
- Some scripts useful for red team activities☆1,560Updated 3 years ago
- ☆2,187Updated last year
- Wi-Fi Exploitation Framework☆2,455Updated 4 months ago
- Fully featured and community-driven hacking environment☆2,050Updated last week
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆890Updated 2 years ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,408Updated 4 months ago
- Pentest Report Generator☆2,379Updated last week
- Network Analysis Tool☆3,138Updated last year
- Offensive Software Exploitation Course☆2,351Updated last year
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,471Updated 3 years ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆884Updated last year
- Arsenal is just a quick inventory and launcher for hacking programs☆3,284Updated 2 months ago
- All MITM attacks in one place.☆957Updated 3 years ago
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆361Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,738Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,376Updated 2 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,312Updated last year
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆812Updated 2 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,699Updated 2 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,855Updated 3 months ago
- Update Version 3.1 added free SMS messaging.☆473Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,110Updated 3 months ago