n0kovo / ssid-keyspace-table
Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface credentials.
☆11Updated 3 years ago
Alternatives and similar repositories for ssid-keyspace-table:
Users that are interested in ssid-keyspace-table are comparing it to the libraries listed below
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆11Updated last month
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆10Updated last month
- Makefiles, and source-codes for my openwrt-useful-tools repo.☆14Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Small tool to capture packets from Bluetooth devices.☆47Updated last year
- Simple Tool for webhacking☆11Updated last year
- XSSRecon - Reflected XSS Scanner☆23Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆31Updated last month
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆19Updated 3 months ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 6 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- ☆42Updated 2 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- Force target victim to unsafe network☆20Updated last week
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆20Updated last year
- Various wordlists☆59Updated 3 months ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Obtain handshakes from networks out of your range!☆28Updated 3 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Updated 6 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆57Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ☆29Updated 2 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 3 years ago