☆209Apr 12, 2018Updated 7 years ago
Alternatives and similar repositories for warvox
Users that are interested in warvox are comparing it to the libraries listed below
Sorting:
- A Voip Wardialer for the phreaking of 2020☆56Jun 27, 2024Updated last year
- A ton of helpful tools☆39Oct 8, 2021Updated 4 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- Public non-official repository of the famous ToneLoc wardialer☆50May 8, 2020Updated 5 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- ☆16Apr 16, 2017Updated 8 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆56Jan 31, 2019Updated 7 years ago
- A Powershell incident response framework☆1,640Nov 22, 2022Updated 3 years ago
- iWar - The intelligent war dialer.☆29Apr 1, 2020Updated 5 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Hack accounts and passwords on Asterisk servers☆17Mar 16, 2015Updated 10 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Nov 30, 2018Updated 7 years ago
- ☆108Mar 21, 2017Updated 8 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,913Nov 19, 2025Updated 3 months ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- ☆73Jan 11, 2018Updated 8 years ago
- Tools for working with the 802.11B scrambler when writing Packet-in-Packet exploits.☆20Sep 15, 2013Updated 12 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 5 months ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Feb 11, 2012Updated 14 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- ☆18Nov 6, 2016Updated 9 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Mar 10, 2020Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- GRR Rapid Response: remote live forensics for incident response☆5,041Feb 16, 2026Updated 2 weeks ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Aug 14, 2015Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Nov 24, 2014Updated 11 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- ☆285Sep 19, 2014Updated 11 years ago