Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting relations between APs, clients and it's Probes, WPS information and a global view of all the APs seen.
☆124Oct 24, 2025Updated 5 months ago
Alternatives and similar repositories for wifi_db
Users that are interested in wifi_db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Mar 12, 2026Updated 2 weeks ago
- Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge L…☆372Feb 26, 2026Updated last month
- A WPA3 dictionary cracker☆351Jul 10, 2023Updated 2 years ago
- Grepz is a versatile command-line tool for searching and highlighting specific terms or regex in a text file. Its customizable color opti…☆15May 4, 2023Updated 2 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆62Sep 27, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆37Aug 13, 2025Updated 7 months ago
- PEN-103-Kali-Linux-Revealed-KLR-Cheat-Sheet☆29Oct 19, 2025Updated 5 months ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆32Mar 15, 2022Updated 4 years ago
- Plugin for Kismet to calculate Distance of devices☆16Jun 9, 2019Updated 6 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- ☆10Oct 9, 2024Updated last year
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- Some binaries/scripts that may be useful in red team/pentest exercises☆22Feb 25, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple script demonstrating the power that comes with SSID sniffing☆17May 7, 2019Updated 6 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆29Apr 30, 2025Updated 10 months ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- ☆242Jun 15, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 6 months ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Feb 20, 2023Updated 3 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Aug 27, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A WLAN red team framework.☆159Feb 9, 2026Updated last month
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆245Feb 3, 2025Updated last year
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆413Mar 21, 2025Updated last year
- Python script that performs email address validation against Office 365 without submitting login attempts.☆376Aug 7, 2020Updated 5 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Oct 22, 2020Updated 5 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Kismet REST Python API (mirrored from Kismet repos)☆31Dec 24, 2025Updated 3 months ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.☆29Feb 6, 2013Updated 13 years ago
- Study guide and command sheet for Offensive Security PEN-210 course (Offensive Security Wireless Pentester - OSWP)☆106Nov 11, 2023Updated 2 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆163Feb 2, 2026Updated last month
- Tools and Resources for Physical Security Red Teaming☆46Mar 11, 2026Updated 2 weeks ago