redcode-labs / AirStrikeLinks
Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
☆197Updated 3 years ago
Alternatives and similar repositories for AirStrike
Users that are interested in AirStrike are comparing it to the libraries listed below
Sorting:
- A WLAN red team framework.☆156Updated 11 months ago
- Automated rogue access point setup tool.☆198Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- A polyglot payload generator☆244Updated 3 years ago
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆238Updated 4 years ago
- Modular personalized dictionary generator.☆212Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Zero Infrastructure Password Cracking☆409Updated last year
- Yet another content discovery tool☆119Updated 10 months ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆294Updated 4 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆152Updated 3 years ago
- Integrated web scraper and email account data breach comparison tool☆78Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- For pentesters who don't wanna leave their terminals.☆184Updated 4 years ago
- An Encrypted File transfer via AES-256-CBC☆52Updated 4 years ago
- on-the-fly☆85Updated last year
- Perform automated network reconnaissance scans☆234Updated 2 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆119Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Customized Password/Passphrase List inputting Target Info☆92Updated 10 months ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 9 months ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆62Updated 4 years ago