nikita-yfh / OneShot-CLinks
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
☆97Updated 3 years ago
Alternatives and similar repositories for OneShot-C
Users that are interested in OneShot-C are comparing it to the libraries listed below
Sorting:
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆208Updated this week
- Plugins for airgeddon☆80Updated last week
- WPS pin generator written in Python 3☆56Updated 4 years ago
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆82Updated 5 months ago
- Bully WPS Attack Tool☆87Updated last year
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆72Updated 5 years ago
- Plugins for airgeddon☆46Updated last month
- ☆179Updated 2 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆74Updated last year
- Automated exploit scanner for cameras on the internet☆210Updated last year
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆33Updated 5 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆234Updated last year
- 😁 BurpSuite Pro Auto Installation Script For Linux And Windows! 👍☆20Updated 4 years ago
- My Wi-Fi scripts☆52Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64Updated 2 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆119Updated last month
- Enhanced functions and new features for airgeddon!☆115Updated last month
- Repo containing cracked red teaming tools.☆209Updated last month
- Interactive shell to execute commands anonymously using Proxychains and Tor☆49Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆118Updated 2 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆92Updated 7 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- Install Burpsuite pro in Linux OS☆16Updated last year
- A free SSH KaliLinux server (Segfault) without limited time,You can use this for test any tool or using kali linux tools or anything else…☆107Updated 6 months ago
- Will disable windows defender at first and then run PowerShell as administrator to run the download code.☆13Updated 4 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆188Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 2 months ago
- Magic tool for managing internet connection in local network by @zalexdev☆30Updated 3 years ago