mr-r3b00t / cyberwar
☆11Updated 2 years ago
Alternatives and similar repositories for cyberwar:
Users that are interested in cyberwar are comparing it to the libraries listed below
- Discord bot for the Shodan API - OSINT tool☆69Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆68Updated 3 weeks ago
- Detect Stalkers with Wardriving, using Python☆38Updated last year
- Monitor 802.11 probe requests from a capture file or network sniffing!☆31Updated last month
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Crack passwords with Hashcat using a Discord Bot.☆24Updated last year
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆44Updated 2 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆24Updated 3 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆36Updated 2 years ago
- Steganography Reverse Shell☆9Updated last year
- A simple CLI tool for detecting breached emails and corresponding passwords.☆17Updated last year
- Rubber Ducky powered by NeoKey☆22Updated 9 months ago
- ☆25Updated 2 weeks ago
- Capture screenshots of onion services on an onion service.☆48Updated 9 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆106Updated 2 years ago
- Files and Programs for UAV and Drone Cybersecurity Workshop☆29Updated last year
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆12Updated 6 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 8 months ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated last year
- Force target victim to unsafe network☆20Updated last week
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated last year
- Collection of FCC IDs for car keyfobs☆43Updated 2 years ago
- Files for Aerospace Cybersecurity: Satellite Hacking Workshop☆41Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated last year
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Tools and Resources for Physical Security Red Teaming☆31Updated 2 months ago