Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting relations between APs, clients and it's Probes, WPS information and a global view of all the APs seen.
☆127Oct 24, 2025Updated 6 months ago
Alternatives and similar repositories for wifi_db
Users that are interested in wifi_db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆85Oct 27, 2023Updated 2 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Apr 29, 2026Updated last week
- Virtualized Wi-Fi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge …☆386Updated this week
- A WPA3 dictionary cracker☆358Jul 10, 2023Updated 2 years ago
- Grepz is a versatile command-line tool for searching and highlighting specific terms or regex in a text file. Its customizable color opti…☆15May 4, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆62Sep 27, 2023Updated 2 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆37Aug 13, 2025Updated 8 months ago
- PEN-103-Kali-Linux-Revealed-KLR-Cheat-Sheet☆29Oct 19, 2025Updated 6 months ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆32Mar 15, 2022Updated 4 years ago
- ☆16Dec 7, 2025Updated 5 months ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 11 months ago
- ☆10Oct 9, 2024Updated last year
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Some binaries/scripts that may be useful in red team/pentest exercises☆22Apr 29, 2026Updated last week
- A simple script demonstrating the power that comes with SSID sniffing☆17May 7, 2019Updated 7 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆29Apr 30, 2025Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 4 months ago
- ☆240Jun 15, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 4 months ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 10 years ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Feb 20, 2023Updated 3 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Aug 27, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A WLAN red team framework.☆161Feb 9, 2026Updated 3 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Mar 21, 2023Updated 3 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆246Feb 3, 2025Updated last year
- Tools used for Pentesting☆22Apr 21, 2023Updated 3 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆421Mar 21, 2025Updated last year
- Python script that performs email address validation against Office 365 without submitting login attempts.☆382Aug 7, 2020Updated 5 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆16Oct 22, 2020Updated 5 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- Kismet REST Python API (mirrored from Kismet repos)☆32Dec 24, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Aliases and functions for the lazy penetration tester☆69Jan 28, 2024Updated 2 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Jan 22, 2021Updated 5 years ago
- Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.☆29Feb 6, 2013Updated 13 years ago
- Study guide and command sheet for Offensive Security PEN-210 course (Offensive Security Wireless Pentester - OSWP)☆108Nov 11, 2023Updated 2 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- Tools and Resources for Physical Security Red Teaming☆48Mar 11, 2026Updated last month