nikita-yfh / OneShot-C
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
☆81Updated 2 years ago
Alternatives and similar repositories for OneShot-C:
Users that are interested in OneShot-C are comparing it to the libraries listed below
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆136Updated 11 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆66Updated 8 months ago
- WPS pin generator written in Python 3☆45Updated 4 years ago
- Kali Packerge Manager☆59Updated last year
- Arkhota, a web brute forcer for Android.☆20Updated 2 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆77Updated last month
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆29Updated 4 years ago
- Bully WPS Attack Tool☆69Updated 11 months ago
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆12Updated 2 years ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated last week
- Clipboard poisoning attack.☆56Updated 4 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆103Updated last year
- Automated exploit scanner for cameras on the internet☆189Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆82Updated last year
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆71Updated last week
- This is a exploit with the capability to control ip camera movement even without a username and password.☆57Updated 7 months ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆10Updated 3 weeks ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆72Updated last week
- Interactive shell to execute commands anonymously using Proxychains and Tor☆37Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- A tool for WI-FI penetration testing that automates your attacking processes.☆29Updated 3 weeks ago
- Magic tool for managing internet connection in local network by @zalexdev☆25Updated 3 years ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- A free SSH KaliLinux server (Segfault) without limited time,You can use this for test any tool or using kali linux tools or anything else…☆72Updated 4 months ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆103Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆63Updated 2 years ago
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆17Updated 3 months ago
- Here are the most interesting Shodan dorks (according to me)☆75Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆78Updated 8 months ago