koutto / pi-pwnbox-rogueapView external linksLinks
Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap
☆1,991Mar 13, 2024Updated last year
Alternatives and similar repositories for pi-pwnbox-rogueap
Users that are interested in pi-pwnbox-rogueap are comparing it to the libraries listed below
Sorting:
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,487Jan 18, 2026Updated 3 weeks ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,694Jul 6, 2025Updated 7 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,622Jan 5, 2025Updated last year
- Automation for internal Windows Penetrationtest / AD-Security☆3,641Aug 28, 2025Updated 5 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,403Dec 20, 2025Updated last month
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,115Sep 29, 2025Updated 4 months ago
- A swiss army knife for pentesting networks☆9,056Dec 6, 2023Updated 2 years ago
- Update Version 3.1 added free SMS messaging.☆499Feb 4, 2022Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,192Updated this week
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,895Jun 27, 2023Updated 2 years ago
- 🕵️♂️ Offensive Google framework.☆18,410Feb 5, 2026Updated last week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,867Aug 18, 2023Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,722Feb 2, 2026Updated 2 weeks ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,606Jul 18, 2024Updated last year
- Dumping DPAPI credz remotely☆1,318Mar 24, 2025Updated 10 months ago
- game of active directory☆7,437Jul 16, 2025Updated 7 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,464Nov 16, 2025Updated 3 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,897Oct 29, 2025Updated 3 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,152Updated this week
- Tools and Techniques for Red Team / Penetration Testing☆8,493Mar 18, 2025Updated 10 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,034Feb 8, 2026Updated last week
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,508Feb 5, 2026Updated last week
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,447Dec 12, 2024Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,460Sep 22, 2024Updated last year
- Attack Surface Management Platform☆9,386Jan 12, 2026Updated last month
- Infection Monkey - An open-source adversary emulation platform☆6,944May 1, 2025Updated 9 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,442Oct 1, 2025Updated 4 months ago
- Red Teaming Tactics and Techniques☆4,487Aug 22, 2024Updated last year
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,414Mar 1, 2024Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,870Updated this week
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,254Mar 19, 2025Updated 10 months ago
- Red Team Cheatsheet in constant expansion.☆1,256Dec 28, 2023Updated 2 years ago
- Network Analysis Tool☆3,331Apr 10, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,368Oct 22, 2025Updated 3 months ago
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,663Jan 23, 2025Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,300Jun 1, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆886Updated this week