michenriksen / wifiphisher
Automated phishing attacks against WiFi networks
☆9Updated 9 years ago
Alternatives and similar repositories for wifiphisher:
Users that are interested in wifiphisher are comparing it to the libraries listed below
- PHP Phishing Framework☆28Updated 11 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Search drives for documents containing passwords☆62Updated 10 years ago
- Query Shodan and Censys data for fast parsing☆38Updated 6 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 6 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- Python Remote Administration Tool☆13Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆66Updated 6 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- PowerShellUtilities provides various utility commandlets.☆51Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Simple bash script to enumerate Linux machines☆13Updated 6 years ago