Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
☆196Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for AirStrike
Users that are interested in AirStrike are comparing it to the libraries listed below
Sorting:
- Fast and intuitive manager for multiple reverse shells☆86Dec 7, 2024Updated last year
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Yet Another Sniffer for monitoring network traffic☆84Jun 12, 2021Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Nov 19, 2021Updated 4 years ago
- A polyglot payload generator☆242Aug 15, 2022Updated 3 years ago
- Golang reverse/bind shell generator☆229Jan 3, 2022Updated 4 years ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆198Mar 27, 2025Updated 11 months ago
- macOS persistence tool☆229Feb 9, 2022Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆95Aug 4, 2023Updated 2 years ago
- Collection of red machine learning projects☆41Aug 16, 2021Updated 4 years ago
- Web Service write in Python for control and protect your android device remotely.☆190Dec 14, 2022Updated 3 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Sep 7, 2023Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆627May 28, 2024Updated last year
- Assist reverse tcp shells in post-exploration tasks☆219Oct 17, 2025Updated 4 months ago
- A tool to find redirection chains in multiple URLs☆78Jan 1, 2025Updated last year
- fully automated pentesting tool☆518Dec 8, 2022Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Vaf is a cross-platform very advanced and fast web fuzzer written in nim☆320May 29, 2022Updated 3 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆605Mar 19, 2022Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Check if your provider is blocking you!☆104May 30, 2022Updated 3 years ago
- Configure kali 2020.4 headless/headed for RPi4b☆15Jan 28, 2021Updated 5 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 3 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Mar 31, 2024Updated last year
- Hide your payload in DNS☆615May 3, 2023Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago