n0kovo / ssid-keyspace-tableLinks
Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface credentials.
☆12Updated 3 years ago
Alternatives and similar repositories for ssid-keyspace-table
Users that are interested in ssid-keyspace-table are comparing it to the libraries listed below
Sorting:
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 3 months ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated 3 months ago
- Just a better dirbuster☆13Updated 2 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Updated 7 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Build interactive map of cameras from Shodan☆23Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Collection of extra pentest tools for Kali Linux☆104Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Legba recipes.☆50Updated 9 months ago
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 2 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆14Updated 3 months ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆18Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Obtain handshakes from networks out of your range!☆28Updated 3 years ago
- Command List for Hashcat and default keyspaces.☆16Updated 5 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Updated last year
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- ☆17Updated 7 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆17Updated 3 weeks ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year