redcode-labs / AirStrikeLinks
Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
☆196Updated 3 years ago
Alternatives and similar repositories for AirStrike
Users that are interested in AirStrike are comparing it to the libraries listed below
Sorting:
- A WLAN red team framework.☆154Updated last year
- Automated rogue access point setup tool.☆201Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆242Updated 4 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆111Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 5 years ago
- A polyglot payload generator☆242Updated 3 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated 2 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆257Updated 3 years ago
- Yet another content discovery tool☆120Updated last year
- Integrated web scraper and email account data breach comparison tool☆78Updated last year
- ☆72Updated 2 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Perform automated network reconnaissance scans☆239Updated 2 years ago
- Full Valid Fake Data Generator☆101Updated last year
- An Encrypted File transfer via AES-256-CBC☆52Updated 4 years ago
- Web Service write in Python for control and protect your android device remotely.☆191Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆81Updated 4 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- Grawler is a tool written in PHP which comes with a web interface that automates the task of using google dorks, scrapes the results, and…☆214Updated last year
- Modular personalized dictionary generator.☆214Updated last year
- Functions that can be used to gain Reverse Shells with PowerShell☆84Updated 3 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 4 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- WITCHCRAFT is a cyberdeck toolkit built for runners who dive deep into the mesh. It’s your all-in-one rig for data-ghosting, ICE-breaking…☆43Updated 3 months ago