moxie0 / chapcrack
☆380Updated 12 years ago
Alternatives and similar repositories for chapcrack:
Users that are interested in chapcrack are comparing it to the libraries listed below
- Automated Linux evil maid attack☆426Updated 9 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- Database of private SSL/SSH keys for embedded devices☆257Updated last year
- ☆141Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆242Updated 10 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆381Updated 2 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆241Updated 8 years ago
- Modified hostapd to facilitate AP impersonation attacks☆505Updated 6 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Demonstrates the "heartbleed" problem using full OpenSSL stack☆702Updated 8 years ago
- Create fake AP in Kali with 1 command☆268Updated 9 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆197Updated 8 years ago
- for the louise☆242Updated 4 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆343Updated 8 years ago
- Protect your Wireless Network from Evil Access Points!☆180Updated last year
- NTP Main-in-the-Middle tool☆244Updated 3 years ago
- ID-spoofing NFS client☆295Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 8 years ago
- Specify targets and run sets of tools against them☆389Updated 5 years ago
- ☆206Updated 7 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆363Updated 10 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- Cartero - Social Engineering Framework☆172Updated 4 years ago
- Password Hash Identification☆219Updated 11 years ago
- Wolves Among the Sheep☆147Updated last year
- ☆224Updated 10 months ago
- SpiderLabs shared Nmap Tools☆229Updated 4 years ago
- SSLStrip version to defeat HSTS☆316Updated 7 years ago
- ☆124Updated 5 years ago