philsmd / hccap2capLinks
Converts hashcat .hccap files back to .cap files
☆15Updated 10 years ago
Alternatives and similar repositories for hccap2cap
Users that are interested in hccap2cap are comparing it to the libraries listed below
Sorting:
- WPS scan and pwn tool☆70Updated 6 years ago
- Work in progress toolkit for KRACK attack.☆70Updated 6 years ago
- ☆38Updated 8 years ago
- Linux RDP Scanner and Bruteforcer Scripts☆59Updated 10 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 8 years ago
- IRC-based mass router scanner/exploiter - The project is no longer maintained.☆89Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 10 years ago
- simple reverse tcp backdoor hack☆63Updated 5 years ago
- Auto Reaver - multiple access point attack using Reaver☆52Updated 9 years ago
- WPS related utilities☆166Updated 10 years ago
- new WPS attack tool☆60Updated 10 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37Updated 12 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆139Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- ☆54Updated 8 years ago
- KeySniffer device discovery tools and public advisories☆119Updated 9 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated 2 years ago
- MS17-010 Research☆96Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- Offensive DNS server☆67Updated 7 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- Remote Code Execution exploit on TVT DVR☆62Updated 4 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Updated 9 years ago
- Distributed wrapper around oclHashcat☆93Updated 10 months ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆93Updated 9 years ago
- A modular distributed penetration testing tool.☆41Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago