redcode-labs / AirStrikeLinks
Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
☆197Updated 3 years ago
Alternatives and similar repositories for AirStrike
Users that are interested in AirStrike are comparing it to the libraries listed below
Sorting:
- Automated rogue access point setup tool.☆197Updated 4 years ago
- A WLAN red team framework.☆156Updated 9 months ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆237Updated 11 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 4 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- A polyglot payload generator☆242Updated 2 years ago
- Zero Infrastructure Password Cracking☆408Updated 10 months ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 3 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- Web Application Vulnerability Scanner☆126Updated 4 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Modular personalized dictionary generator.☆209Updated 11 months ago
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆237Updated 3 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- Yet another content discovery tool☆119Updated 7 months ago
- Perform automated network reconnaissance scans☆231Updated 2 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆149Updated 3 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 4 years ago
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆296Updated 3 years ago
- Customized Password/Passphrase List inputting Target Info☆90Updated 8 months ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆121Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆61Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated last week