martin-olivier / airgorahLinks
A WiFi security auditing software mainly based on aircrack-ng tools suite
☆326Updated this week
Alternatives and similar repositories for airgorah
Users that are interested in airgorah are comparing it to the libraries listed below
Sorting:
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆219Updated 2 years ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆193Updated 10 months ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆323Updated 2 weeks ago
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆136Updated last year
- Automated exploit scanner for cameras on the internet☆202Updated last year
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆153Updated last month
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- 🦚 A web-app pentesting suite written in rust .☆312Updated 8 months ago
- MultiPlatform HTTP Reverse Shell☆239Updated 11 months ago
- Repo containing cracked red teaming tools.☆191Updated last month
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆551Updated 3 weeks ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆434Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆314Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆404Updated 8 months ago
- The program for scanning and testing city cameras (DVR, RTSP, Hikvision) is a tool developed exclusively for educational purposes to anal…☆96Updated 6 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year
- Search & Parse Password Leaks☆387Updated 11 months ago
- IoT Camera Reconnaissance and Live Viewer☆157Updated last year
- NetworkSherlock: powerful and flexible port scanning tool With Shodan☆111Updated 3 months ago
- Bypass 403☆165Updated 7 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆202Updated 5 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆479Updated last week
- An OSINT tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling☆771Updated last year
- A Linux persistence tool!☆156Updated last week
- 📲 Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK file…☆136Updated 4 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆387Updated 2 years ago
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆121Updated 4 months ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆530Updated 2 weeks ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆185Updated last year