martin-olivier / airgorahLinks
A WiFi security auditing software mainly based on aircrack-ng tools suite
☆314Updated 7 months ago
Alternatives and similar repositories for airgorah
Users that are interested in airgorah are comparing it to the libraries listed below
Sorting:
- 🦚 A web-app pentesting suite written in rust .☆291Updated 6 months ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆189Updated 7 months ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆306Updated 2 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆136Updated 10 months ago
- Automated exploit scanner for cameras on the internet☆196Updated last year
- Repo containing cracked red teaming tools.☆183Updated last month
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆374Updated 2 years ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆389Updated 6 months ago
- PacketSpy☆155Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆194Updated 3 months ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆475Updated 2 weeks ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆435Updated last year
- MultiPlatform HTTP Reverse Shell☆236Updated 9 months ago
- The program for scanning and testing city cameras (DVR, RTSP, Hikvision) is a tool developed exclusively for educational purposes to anal…☆95Updated 3 months ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆432Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆307Updated last year
- QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security…☆349Updated last year
- Bypass 403☆154Updated 4 months ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆206Updated last year
- Search & Parse Password Leaks☆375Updated 9 months ago
- An XSS Exploitation Tool☆318Updated 2 weeks ago
- Official Kali Linux tool to check all urls of a domain for SQL injections :)☆359Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆172Updated last year
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆481Updated last year
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆517Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆272Updated 3 months ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆388Updated last year