Virtualized Wi-Fi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge Lab with modifications in the challenges and improved stability. Ubuntu virtual machine with virtualized networks and clients to perform Wi-Fi attacks on OPN, WPA2, WPA3 and Enterprise networks.
☆378Feb 26, 2026Updated last month
Alternatives and similar repositories for WiFiChallengeLab-docker
Users that are interested in WiFiChallengeLab-docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆62Sep 27, 2023Updated 2 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆125Oct 24, 2025Updated 5 months ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆85Oct 27, 2023Updated 2 years ago
- Study guide and command sheet for Offensive Security PEN-210 course (Offensive Security Wireless Pentester - OSWP)☆105Nov 11, 2023Updated 2 years ago
- Personal notes used to pass the OSWP exam☆94Aug 10, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A WPA3 dictionary cracker☆356Jul 10, 2023Updated 2 years ago
- Some of my personal notes that helped me pass the OSWP☆60May 15, 2022Updated 3 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,448Feb 15, 2026Updated last month
- The Network Execution Tool☆5,393Updated this week
- game of active directory☆7,669Mar 12, 2026Updated 3 weeks ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,478Sep 22, 2024Updated last year
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 6 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆93May 24, 2025Updated 10 months ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Mar 12, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆242Jun 15, 2024Updated last year
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- This is a collection of some of mine mindmaps abount pentesting created with Obsidian.☆464Jan 15, 2025Updated last year
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆2,008Mar 13, 2024Updated 2 years ago
- SensePost's modified hostapd for wifi attacks.☆606Aug 5, 2024Updated last year
- Compiled Binaries for Ghostpack☆1,635Oct 24, 2024Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,292Apr 1, 2026Updated last week
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆46Oct 29, 2023Updated 2 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,205Jan 20, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A security research site.☆796Mar 12, 2026Updated 3 weeks ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆795Apr 2, 2026Updated last week
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆17Oct 4, 2024Updated last year
- Certified Red Team Operator☆454Apr 17, 2022Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,373Sep 22, 2025Updated 6 months ago
- Monta tu laboratorio para preparar la certificación eCPPT☆19Jun 12, 2023Updated 2 years ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,648Aug 29, 2025Updated 7 months ago
- i made this simple lite version of dsplit.exe to detect antivirus signature matching☆15Nov 6, 2013Updated 12 years ago
- ☆438Mar 2, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,142Nov 28, 2024Updated last year
- Azure APIs enumeration and abuse☆12Feb 26, 2026Updated last month
- Orange Cyberdefense mindmaps☆1,556Mar 10, 2025Updated last year
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆843Oct 29, 2025Updated 5 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,773Feb 27, 2026Updated last month
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,816Sep 4, 2024Updated last year
- A penetration testing Swiss Army Knife that's suitable for CTF challenges, bug bounty hunting and red team assessments.☆33Mar 26, 2026Updated 2 weeks ago