pollonegro / Lan-DropboxLinks
Penetration testing “drop box”
☆14Updated 7 years ago
Alternatives and similar repositories for Lan-Dropbox
Users that are interested in Lan-Dropbox are comparing it to the libraries listed below
Sorting:
- Wireless Pentesting Device☆24Updated 5 years ago
- Rogue Access Point Detector☆36Updated last year
- hostapd-mana - build-files, and installation-files for OpenWRT☆33Updated 4 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- wordlists for password cracking☆28Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Updated 7 years ago
- Random Hashcat Scrips☆33Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- ☆16Updated 8 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Legba recipes.☆51Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- Simple Karma Attack☆68Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 5 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 3 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Updated 4 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆72Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- An experiment to address digital intelligence archiving on offensive engagements.☆26Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- ☆11Updated 5 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Public Exploits☆10Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆89Updated 4 years ago