pinecone-wifi / pinecone
A WLAN red team framework.
☆142Updated last month
Related projects ⓘ
Alternatives and complementary repositories for pinecone
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆148Updated this week
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆119Updated 2 years ago
- Hiding GoPhish from the boys in blue☆173Updated last year
- Wordlists handcrafted (and automated) with ♥☆190Updated 7 months ago
- Simple & Customizable DNS Data Exfiltrator☆106Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆117Updated 4 months ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆109Updated 2 years ago
- parse nmap files☆143Updated 9 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆93Updated last year
- Generate graphs and charts based on password cracking result☆154Updated last year
- ☆121Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆291Updated last year
- A script to dump files and folders remotely from a Windows SMB share.☆211Updated 4 months ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆58Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆104Updated 5 months ago
- Easy red team phishing with Puppeteer☆127Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆83Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆78Updated 5 months ago
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 3 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆88Updated 3 weeks ago
- Tool to generate csrf payloads based on vulnerable requests☆61Updated 4 years ago
- ☆184Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆192Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 4 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆141Updated last year