redcode-labs / AirStrikeLinks
Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
☆196Updated 4 years ago
Alternatives and similar repositories for AirStrike
Users that are interested in AirStrike are comparing it to the libraries listed below
Sorting:
- A WLAN red team framework.☆155Updated last week
- Automated rogue access point setup tool.☆201Updated 4 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆244Updated last year
- A polyglot payload generator☆242Updated 3 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- Modular personalized dictionary generator.☆212Updated last year
- Yet another content discovery tool☆118Updated last year
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆242Updated 4 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆87Updated 4 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆121Updated 2 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆381Updated 2 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- For pentesters who don't wanna leave their terminals.☆183Updated 4 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated 2 years ago
- Attack Surface Discovery tool built on a microservice approach, utilizing multi-threading for fast, internet-scale asset indexing☆255Updated last month
- on-the-fly☆86Updated last year
- Perform automated network reconnaissance scans☆237Updated 2 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Zero Infrastructure Password Cracking☆413Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆66Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- WITCHCRAFT is a cyberdeck toolkit built for runners who dive deep into the mesh. It’s your all-in-one rig for data-ghosting, ICE-breaking…☆44Updated 5 months ago
- Customized Password/Passphrase List inputting Target Info☆97Updated last year
- Generate common Reverse Shells for Pentesting☆43Updated 4 years ago