Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge Lab with modifications in the challenges and improved stability. Ubuntu virtual machine with virtualized networks and clients to perform Wi-Fi attacks on OPN, WPA2, WPA3 and Enterprise networks.
☆361Feb 19, 2026Updated last week
Alternatives and similar repositories for WiFiChallengeLab-docker
Users that are interested in WiFiChallengeLab-docker are comparing it to the libraries listed below
Sorting:
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆61Sep 27, 2023Updated 2 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆121Oct 24, 2025Updated 4 months ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆84Oct 27, 2023Updated 2 years ago
- Personal notes used to pass the OSWP exam☆94Aug 10, 2022Updated 3 years ago
- Study guide and command sheet for Offensive Security PEN-210 course (Offensive Security Wireless Pentester - OSWP)☆105Nov 11, 2023Updated 2 years ago
- A WPA3 dictionary cracker☆350Jul 10, 2023Updated 2 years ago
- The Network Execution Tool☆5,279Updated this week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,301Feb 15, 2026Updated last week
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆17Oct 4, 2024Updated last year
- game of active directory☆7,484Jul 16, 2025Updated 7 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,465Sep 22, 2024Updated last year
- Some of my personal notes that helped me pass the OSWP☆60May 15, 2022Updated 3 years ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,991Mar 13, 2024Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,284Sep 9, 2025Updated 5 months ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆302Jan 20, 2026Updated last month
- A security research site.☆783Updated this week
- This is a collection of some of mine mindmaps abount pentesting created with Obsidian.☆459Jan 15, 2025Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆779Oct 16, 2025Updated 4 months ago
- ☆242Jun 15, 2024Updated last year
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,132Nov 28, 2024Updated last year
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- SensePost's modified hostapd for wifi attacks.☆600Aug 5, 2024Updated last year
- Compiled Binaries for Ghostpack☆1,604Oct 24, 2024Updated last year
- Burp Suite Certified Practitioner Exam Study☆1,323Feb 5, 2026Updated 3 weeks ago
- Golden collection of weak passwords☆71Dec 12, 2024Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Oct 29, 2023Updated 2 years ago
- Lab used for workshop and CTF☆501Feb 3, 2026Updated 3 weeks ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,637Aug 29, 2025Updated 6 months ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆13Apr 12, 2023Updated 2 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,737Feb 2, 2026Updated 3 weeks ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆673Feb 17, 2026Updated last week
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,188Jan 20, 2023Updated 3 years ago
- Certified Red Team Operator☆451Apr 17, 2022Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago
- ☆731Updated this week
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,345Sep 22, 2025Updated 5 months ago