redcode-labs / AirStrike
Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
☆193Updated 3 years ago
Alternatives and similar repositories for AirStrike:
Users that are interested in AirStrike are comparing it to the libraries listed below
- A WLAN red team framework.☆150Updated 5 months ago
- Automated rogue access point setup tool.☆194Updated 3 years ago
- A polyglot payload generator☆239Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 8 months ago
- Zero Infrastructure Password Cracking☆401Updated 7 months ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated last year
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆153Updated this week
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆227Updated 7 months ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 3 months ago
- Simple & Customizable DNS Data Exfiltrator☆109Updated last year
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- Yet another content discovery tool☆119Updated 4 months ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆145Updated 3 years ago
- For pentesters who don't wanna leave their terminals.☆183Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆290Updated 3 years ago
- Customized Password/Passphrase List inputting Target Info☆85Updated 4 months ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆364Updated last year
- Generate common Reverse Shells for Pentesting☆41Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆108Updated 4 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆106Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆48Updated 3 years ago
- Wordlists handcrafted (and automated) with ♥☆215Updated last week
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆371Updated 2 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year