medpaf / hawk
Network, recon and offensive-security tool for Linux.
☆292Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for hawk
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆178Updated last year
- Update Version 3.1 added free SMS messaging.☆472Updated 2 years ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- Hide your payload into .jpg file☆383Updated 2 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆368Updated 3 years ago
- Kraken: A multi-platform distributed brute-force password cracking system☆300Updated last year
- Automated WPA/WPA2 PSK attack tool.☆545Updated 3 years ago
- Tool Information Gathering & social engineering Write By [Python,JS,PHP]☆492Updated 8 months ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆361Updated 2 years ago
- E4GL30S1NT - Simple Information Gathering Tool☆552Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆223Updated 3 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆192Updated 2 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆247Updated 2 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆396Updated 10 months ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆84Updated last month
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆284Updated last week
- GUI Osint Framework with Kali Linux☆138Updated last year
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆148Updated 7 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆506Updated 9 months ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆482Updated 4 months ago
- Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info☆447Updated last month
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆212Updated 4 months ago
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆233Updated 3 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆283Updated 4 years ago
- Popular OSINT framework for online investigations.☆239Updated last week
- WiFi Penetration Testing Guide☆420Updated 11 months ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆368Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆224Updated 3 years ago
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆271Updated 2 years ago