redcode-labs / AirStrikeLinks
Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
☆197Updated 3 years ago
Alternatives and similar repositories for AirStrike
Users that are interested in AirStrike are comparing it to the libraries listed below
Sorting:
- A WLAN red team framework.☆157Updated 10 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆240Updated last year
- Automated rogue access point setup tool.☆196Updated 4 years ago
- Modular personalized dictionary generator.☆208Updated last year
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆238Updated 4 years ago
- A polyglot payload generator☆242Updated 3 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Yet another content discovery tool☆119Updated 9 months ago
- Customized Password/Passphrase List inputting Target Info☆90Updated 9 months ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆151Updated 3 years ago
- ☆70Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Web Application Vulnerability Scanner☆127Updated 4 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆90Updated 3 years ago
- Web Service write in Python for control and protect your android device remotely.☆193Updated 2 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- WITCHCRAFT is a cyberdeck toolkit built for runners who dive deep into the mesh. It’s your all-in-one rig for data-ghosting, ICE-breaking…☆40Updated last week
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆76Updated 5 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆163Updated 4 years ago
- Perform automated network reconnaissance scans☆233Updated 2 years ago
- Uncover the full name of a target on Linkedin.☆163Updated 3 years ago
- Zero Infrastructure Password Cracking☆408Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 8 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago