morpheuslord / WinFiHack
A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.
☆77Updated 8 months ago
Alternatives and similar repositories for WinFiHack:
Users that are interested in WinFiHack are comparing it to the libraries listed below
- Nmap & SQL injection automation tool☆31Updated 5 months ago
- PassBreaker☆58Updated 11 months ago
- Kali Packerge Manager☆59Updated last year
- Bypass 403☆137Updated last month
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆69Updated last month
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆103Updated last year
- Gmail/GSuite account enumeration tool☆50Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆56Updated 6 months ago
- Boost website hits by generating requests from multiple proxy IPs.☆64Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- Chrome extension tool for OSINT & Recon☆53Updated last year
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆143Updated 10 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 9 months ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated this week
- Brute forcing login pages with SQL Injection queries with cURL☆17Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆70Updated last month
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆34Updated last year
- Hacking with PasteJacking technique☆21Updated 8 months ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆19Updated last week
- Mass bruteforce authentication of common services with common credentials.☆47Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆102Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆40Updated 4 months ago
- PacketSpy☆151Updated 9 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆35Updated 7 months ago
- Web Path Finder☆60Updated last year
- Auto exploitation tool for CVE-2024-24401.☆33Updated 6 months ago