redcode-labs / AirStrike
Automatically grab and crack WPA-2 handshakes with distributed client-server architecture
☆188Updated 2 years ago
Related projects: ⓘ
- A WLAN red team framework.☆141Updated 7 months ago
- A polyglot payload generator☆238Updated 2 years ago
- Automated rogue access point setup tool.☆190Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆281Updated 3 years ago
- Zero Infrastructure Password Cracking☆389Updated 3 weeks ago
- ☆292Updated this week
- Simple & Customizable DNS Data Exfiltrator☆106Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆136Updated 3 years ago
- For pentesters who don't wanna leave their terminals.☆181Updated 3 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆104Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆145Updated this week
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆102Updated 10 months ago
- Python Gmail User Enumeration Tool☆112Updated 2 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆89Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆147Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆92Updated last year
- Low to medium multithreaded Ubuntu Core honeypot coded in Python.☆76Updated 3 years ago
- Integrated web scraper and email account data breach comparison tool☆74Updated last month
- CrackerJack / Hashcat Web Interface / Context Information Security☆355Updated 7 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆115Updated 2 months ago
- Wordlists handcrafted (and automated) with ♥☆189Updated 5 months ago
- Uncover the full name of a target on Linkedin.☆152Updated 2 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆124Updated 3 years ago
- Generate common Reverse Shells for Pentesting☆38Updated 3 years ago
- msImpersonate - User account impersonation written in pure Python3☆106Updated 2 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆145Updated 2 years ago
- Assist reverse tcp shells in post-exploration tasks☆210Updated 6 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆420Updated 10 months ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆53Updated last year
- A web front-end for password cracking and analytics☆345Updated last month