redcode-labs / AirStrikeLinks
Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
☆197Updated 3 years ago
Alternatives and similar repositories for AirStrike
Users that are interested in AirStrike are comparing it to the libraries listed below
Sorting:
- A WLAN red team framework.☆156Updated 9 months ago
- Automated rogue access point setup tool.☆197Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆238Updated 11 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆238Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 3 years ago
- A polyglot payload generator☆242Updated 2 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆89Updated 3 years ago
- Yet another content discovery tool☆119Updated 8 months ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆149Updated 3 years ago
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- Zero Infrastructure Password Cracking☆407Updated 11 months ago
- Customized Password/Passphrase List inputting Target Info☆90Updated 8 months ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 3 years ago
- Integrated web scraper and email account data breach comparison tool☆79Updated last year
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆129Updated 4 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 7 months ago
- Modular personalized dictionary generator.☆209Updated 11 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆157Updated last week
- Repository and archive for Killing The Bear Gitbook☆83Updated last year
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆367Updated last year
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆163Updated 4 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 7 months ago