rasta-mouse / MjolnirLinks
☆14Updated 10 years ago
Alternatives and similar repositories for Mjolnir
Users that are interested in Mjolnir are comparing it to the libraries listed below
Sorting:
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Auto Reaver - multiple access point attack using Reaver☆52Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Updated 9 years ago
- IRC-based mass router scanner/exploiter - The project is no longer maintained.☆89Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 7 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 11 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- Detect snooper on your system!☆85Updated 9 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- ☆12Updated 9 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Distributed wrapper around oclHashcat☆93Updated 10 months ago
- WPS scan and pwn tool☆70Updated 6 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- AutoBrowser Screenshot☆49Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆17Updated 10 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- MiTM tools and scripts☆19Updated 10 years ago
- Panic button for protection against cold boot attacks☆146Updated 4 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Stagefright Android exploit☆18Updated 3 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago