nmatt0 / netsec-docsLinks
collection of pentesting and network security documents
☆17Updated 3 years ago
Alternatives and similar repositories for netsec-docs
Users that are interested in netsec-docs are comparing it to the libraries listed below
Sorting:
- system setup and scripts for various mitm activities☆96Updated 3 years ago
- This will be a wiki when it grows up, if it grows up☆95Updated 2 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆105Updated 2 years ago
- ☆28Updated 2 years ago
- An Open-Source Door Simulator for RFID/PACS Training☆136Updated 11 months ago
- Analyses wifi probes (from mobile phones etc) and looks them up on wigle to provide possibly commonly visited locations of people near yo…☆29Updated 3 months ago
- Flipper Zero firmware source code + Dict attack improvements☆61Updated 2 years ago
- .sub files for the LED bracelets distributed at DEFCON☆17Updated 3 months ago
- A wordlist for targeting netgear router default WPA2 passwords☆28Updated 2 years ago
- BLE pentesting scripts☆77Updated last week
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆102Updated last year
- Drone Swarmer is an ESP8266 device based on RemoteIDSpoofer that spoofs "ghost" drones by exploiting an Open Drone ID vulnerability using…☆58Updated 2 months ago
- Full Build Guide for making your own RFID Gooseneck Long Range Reader!☆60Updated 2 months ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆50Updated last year
- Wordlists compiled from Bible verses☆18Updated 3 years ago
- ✈️ A device that detects for aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Built using a Raspberr…☆223Updated last year
- Hak5 WiFi Coconut Userspace☆134Updated last year
- Publicly-available tools from Rogue Valley Information Security☆14Updated 8 months ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- ☆37Updated 5 years ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆83Updated 5 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆38Updated 3 years ago
- ☆22Updated last year
- Blue Hydra☆87Updated 10 months ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆27Updated 4 years ago
- Encodes a message using emojis based on a specified pattern.☆18Updated last year
- ☆28Updated last year
- Hacking Reference Documentation☆28Updated last year
- ☆37Updated 2 years ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆81Updated last year