Converts Half-WPA handshake to hashcat
☆19Oct 29, 2018Updated 7 years ago
Alternatives and similar repositories for Half-WPA-converter
Users that are interested in Half-WPA-converter are comparing it to the libraries listed below
Sorting:
- Selective wifi jammer - control who can connect where☆48Sep 12, 2017Updated 8 years ago
- ☆12Oct 5, 2025Updated 5 months ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- Self-localisation of an ESP8266 using the Google Maps API☆24Oct 20, 2017Updated 8 years ago
- Burp extension for quickly copying request/response data.☆31Feb 12, 2026Updated 3 weeks ago
- Adafruit based ESP8266 wardriving hardware☆31Jan 23, 2022Updated 4 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 8 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- awesome.tech download page☆12Aug 20, 2022Updated 3 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- A DMARC scanning and parsing tool.☆33Apr 8, 2025Updated 11 months ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- The most powerful and fastest DoS Attack Tool☆12Dec 8, 2022Updated 3 years ago
- This tool is for pranking your friends😂. It will send messages to your friend on WhatsApp Web automatically at fixed interval (e.g. afte…☆11Apr 12, 2021Updated 4 years ago
- Boilerplate for deploying glue python shell jobs through shell script. For developers, it will be useful as script can install external l…☆13Oct 29, 2019Updated 6 years ago
- cydia源☆10Mar 20, 2022Updated 3 years ago
- Fusion 360 script to create stacked wavy bowls☆12Feb 13, 2019Updated 7 years ago
- [Checker Emails Twitter + Login API Twitter] - API REST Twitter☆10Aug 18, 2018Updated 7 years ago
- A tool which can perform advance recon automatically. Sit back and enjoy this tool work for you and find target's subdomains automaticall…☆11Sep 17, 2021Updated 4 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- A GCode sender for up to two GRBL controller. SVG, DXF import. 4th axis support.☆10Apr 8, 2020Updated 5 years ago
- ☆15Mar 17, 2022Updated 3 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- This repository contains a collection of the most important .pkt files☆17Jul 12, 2023Updated 2 years ago
- Indexador em Python que organiza torrents brasileiros em formato padronizado☆43Updated this week
- ☆12Jul 13, 2020Updated 5 years ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- A tool to convert bitmap images to C arrays for GLCDs☆11Sep 20, 2014Updated 11 years ago
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆18Nov 18, 2025Updated 3 months ago