n0kovo / ssid-keyspace-tableLinks
Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface credentials.
☆14Updated 3 years ago
Alternatives and similar repositories for ssid-keyspace-table
Users that are interested in ssid-keyspace-table are comparing it to the libraries listed below
Sorting:
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆62Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆25Updated 2 months ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 weeks ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 7 months ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆22Updated 6 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆12Updated last week
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 9 years ago
- Packet injection for wifi; simplified.☆37Updated 2 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Updated last year
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆16Updated 4 years ago
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- Various wordlists☆67Updated 9 months ago
- Obtain handshakes from networks out of your range!☆28Updated 4 years ago
- karma WiFi attack implementation☆54Updated 11 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆114Updated 9 months ago
- Simple WPA-PSK default password candidates generator for mobile broadband WIFI routers, based on IMEI☆44Updated last month
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆18Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆32Updated 3 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 9 months ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆46Updated last year
- ☆27Updated 5 years ago
- Script to perform some hashcracking logic automagically☆75Updated last month
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- Command line interface to interact with hashes.com escrow service.☆38Updated 2 months ago