nikita-yfh / OneShot-C
Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
☆78Updated 2 years ago
Alternatives and similar repositories for OneShot-C:
Users that are interested in OneShot-C are comparing it to the libraries listed below
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆129Updated 9 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆65Updated 5 months ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆82Updated last year
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆12Updated 2 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆68Updated 2 weeks ago
- My Wi-Fi scripts☆45Updated 6 months ago
- Kali Packerge Manager☆56Updated last year
- Install Burpsuite pro in Linux OS☆14Updated 9 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆68Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆101Updated last year
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆28Updated 4 years ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆74Updated 6 months ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆14Updated 3 months ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆103Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆36Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 4 months ago
- 😁 BurpSuite Pro Auto Installation Script For Linux And Windows! 👍☆18Updated 4 years ago
- ☆26Updated this week
- Red Team scripts written in python☆18Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆61Updated 10 months ago
- Small tool to capture packets from Bluetooth devices.☆47Updated last year
- ANDRAX The first and unique Penetration Testing platform for Android smartphones☆101Updated 6 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆57Updated 3 years ago
- Will disable windows defender at first and then run PowerShell as administrator to run the download code.☆13Updated 3 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆53Updated 4 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆54Updated 4 months ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆95Updated 9 months ago
- This project is aimed at freely providing technical guides on various hacking tools.☆102Updated 9 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆275Updated 7 months ago