nao3301 / DedsecLinks
commandlinetool will not be updated (only if requested) -> moving project to ruby
☆10Updated 8 years ago
Alternatives and similar repositories for Dedsec
Users that are interested in Dedsec are comparing it to the libraries listed below
Sorting:
- Attacking WPA/WPA encrypted access point without client.☆50Updated 11 years ago
- NAT Pinning exploit tool for penetration testers.☆34Updated 11 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Wireless Security Testing v1.0☆11Updated 7 years ago
- ☆12Updated 5 years ago
- Android 802.11 pentesting tool☆94Updated 11 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆29Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 9 years ago
- A pure python, post-exploitation, remote administration tool (RAT) for macOS / OS X.☆47Updated 8 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆22Updated 8 years ago
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- Controlling your MSR with Visual Basic 6☆19Updated 10 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- hackpack to go with lazykali on menu application Kali Linux☆31Updated 10 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- script to brute force ssh or ftp passwords☆12Updated 9 years ago
- Python wireless library for Linux.☆44Updated 3 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆33Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Disposable Mails From Command Line☆32Updated 5 years ago
- Parallel password cracker. Supports NTLM, LM, MD5, MD4, SHA1, SHA224, SHA256, SHA384, and SHA512.☆39Updated 4 years ago
- ShockWave looks up for every connected device on the local network, then starts sending deauthentication packets to each of them. It is b…☆27Updated 5 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆30Updated 4 years ago
- bluesnarfing proof-of-concept tool.☆53Updated 9 years ago
- Show info about the author by facebook photo url☆39Updated 8 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆20Updated 8 years ago
- Massive arsenal of hacker tools...☆80Updated 7 years ago
- Password cracking utility☆53Updated 4 years ago
- ☆29Updated 8 years ago