n0kovo / ssid-keyspace-tableLinks
Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface credentials.
☆14Updated 3 years ago
Alternatives and similar repositories for ssid-keyspace-table
Users that are interested in ssid-keyspace-table are comparing it to the libraries listed below
Sorting:
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆118Updated 10 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆25Updated 2 weeks ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated last month
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated last month
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- Various wordlists☆68Updated 10 months ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Updated last year
- Script to perform some hashcracking logic automagically☆74Updated 2 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 3 weeks ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 8 months ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆46Updated last year
- Collection of hashcat lists and things.☆52Updated 5 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆16Updated 4 years ago
- Legba recipes.☆51Updated last year
- Command line interface to interact with hashes.com escrow service.☆38Updated 3 months ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆18Updated 2 years ago
- Extract credentials and other useful info from network captures☆72Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆113Updated this week
- Small tool to capture packets from Bluetooth devices.☆53Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆58Updated 6 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- ☆27Updated 5 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆65Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year