routerkeygen / routerkeygenPCView external linksLinks
Qt Port for Linux, Mac OSX and Windows
☆305Sep 2, 2022Updated 3 years ago
Alternatives and similar repositories for routerkeygenPC
Users that are interested in routerkeygenPC are comparing it to the libraries listed below
Sorting:
- Router Keygen generate default WPA/WEP keys for several routers.☆487Jan 21, 2018Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Distributed WPA PSK auditor☆351Jun 15, 2025Updated 7 months ago
- ☆18Sep 10, 2014Updated 11 years ago
- Qt Port for Linux, Mac OSX and Windows☆16Feb 20, 2020Updated 5 years ago
- Simple WPA-PSK default password candidates generator for mobile broadband WIFI routers, based on IMEI☆49Oct 28, 2025Updated 3 months ago
- Small set of tools to generate plainmasterkeys (rainbowtables) and hashes for the use with latest hashcat and John the Ripper.☆115Jan 3, 2024Updated 2 years ago
- Creates a series of empty folders named after default keyspaces.☆12Nov 13, 2015Updated 10 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆30Feb 21, 2022Updated 3 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Tools for encrypting and decrypting things using Cisco's type 7 encryption.☆15Jan 11, 2013Updated 13 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated 2 weeks ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 9 years ago
- An all-in-one WPA/WPS toolkit☆430Aug 31, 2023Updated 2 years ago
- WPS scan and pwn tool☆70Nov 12, 2019Updated 6 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- The Java program that generates the Thomson dictionary☆30Sep 6, 2014Updated 11 years ago
- Modification of help_crack.py from https://wpa-sec.stanev.org/☆22Oct 21, 2024Updated last year
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 14 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Jan 10, 2017Updated 9 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Aug 26, 2015Updated 10 years ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33May 5, 2016Updated 9 years ago
- Shell script to create an onion-router for your Raspberry Pi from a stock Moebius image☆28Jul 10, 2014Updated 11 years ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,318Updated this week
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆592Mar 3, 2022Updated 3 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Mar 30, 2016Updated 9 years ago
- Small tool to capture packets from Bluetooth devices.☆55Jan 3, 2024Updated 2 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Jul 18, 2017Updated 8 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago