Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting relations between APs, clients and it's Probes, WPS information and a global view of all the APs seen.
☆125Oct 24, 2025Updated 5 months ago
Alternatives and similar repositories for wifi_db
Users that are interested in wifi_db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆85Oct 27, 2023Updated 2 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Apr 9, 2026Updated last week
- Virtualized Wi-Fi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge …☆382Feb 26, 2026Updated last month
- A WPA3 dictionary cracker☆356Jul 10, 2023Updated 2 years ago
- Grepz is a versatile command-line tool for searching and highlighting specific terms or regex in a text file. Its customizable color opti…☆15May 4, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆62Sep 27, 2023Updated 2 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆37Aug 13, 2025Updated 8 months ago
- PEN-103-Kali-Linux-Revealed-KLR-Cheat-Sheet☆29Oct 19, 2025Updated 6 months ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆32Mar 15, 2022Updated 4 years ago
- ☆16Dec 7, 2025Updated 4 months ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 11 months ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- Some binaries/scripts that may be useful in red team/pentest exercises☆22Feb 25, 2026Updated last month
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆29Apr 30, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- ☆242Jun 15, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 4 months ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 7 months ago
- A WLAN red team framework.☆160Feb 9, 2026Updated 2 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆246Feb 3, 2025Updated last year
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆415Mar 21, 2025Updated last year
- Python script that performs email address validation against Office 365 without submitting login attempts.☆378Aug 7, 2020Updated 5 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Oct 22, 2020Updated 5 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- Kismet REST Python API (mirrored from Kismet repos)☆31Dec 24, 2025Updated 3 months ago
- Aliases and functions for the lazy penetration tester☆69Jan 28, 2024Updated 2 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Jan 22, 2021Updated 5 years ago
- Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.☆29Feb 6, 2013Updated 13 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Advanced web server fingerprinting☆22Sep 27, 2017Updated 8 years ago
- Study guide and command sheet for Offensive Security PEN-210 course (Offensive Security Wireless Pentester - OSWP)☆105Nov 11, 2023Updated 2 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆164Feb 2, 2026Updated 2 months ago
- Tools and Resources for Physical Security Red Teaming☆46Mar 11, 2026Updated last month
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last month