koutto / pi-pwnbox-rogueapLinks
Homemade Pwnbox / Rogue AP based on Raspberry Pi β WiFi Hacking Cheatsheets + MindMap
β1,922Updated last year
Alternatives and similar repositories for pi-pwnbox-rogueap
Users that are interested in pi-pwnbox-rogueap are comparing it to the libraries listed below
Sorting:
- πSearches Hash APIs to crack your hash quicklyπ If hash is not found, automatically pipes into HashCatβ‘β1,382Updated 7 months ago
- All MITM attacks in one place.β999Updated 3 years ago
- CrackQ: A Python Hashcat cracking queue systemβ939Updated last year
- All In One Web Reconβ2,530Updated 5 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Sβ¦β2,811Updated 2 years ago
- Network Analysis Toolβ3,283Updated 2 years ago
- Wi-Fi Exploitation Frameworkβ2,606Updated 2 weeks ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that β¦β945Updated this week
- Update Version 3.1 added free SMS messaging.β494Updated 3 years ago
- β2,316Updated 2 years ago
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,600Updated 7 months ago
- Basics on commands/tools/info on how to assess the security of mobile applicationsβ1,614Updated last year
- π Lockdoor Framework : A Penetration Testing framework with Cyber Security Resourcesβ1,494Updated 4 months ago
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial β¦β1,425Updated 4 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.β2,383Updated last year
- HomePwn - Swiss Army Knife for Pentesting of IoT Devicesβ915Updated 2 years ago
- The all-in-one browser extension for offensive security professionals πβ6,276Updated 9 months ago
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information aboβ¦β1,666Updated 3 months ago
- Offensive Software Exploitation Courseβ2,384Updated 2 years ago
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.β375Updated 3 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,893Updated 3 years ago
- π Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.β2,475Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and moreβ1,731Updated 11 months ago
- Vagrant VirtualBox environment for conducting an internal network penetration testβ929Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.β1,812Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.β1,760Updated this week
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ3,501Updated 3 months ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.β3,192Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,318Updated 6 months ago
- WiFi Penetration Testing Guideβ604Updated last year