s0i37 / karmaLinks
karma WiFi attack implementation
☆51Updated 10 months ago
Alternatives and similar repositories for karma
Users that are interested in karma are comparing it to the libraries listed below
Sorting:
- My Wi-Fi scripts☆48Updated last year
- exfiltration/infiltration toolkit☆48Updated 9 months ago
- Useful collection of scapy-scripts and more☆30Updated last year
- Collection of antivirus bypass techniques☆11Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆111Updated 8 months ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- Legba recipes.☆50Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆133Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- Cisco IOS Security Inspector☆34Updated last week
- Finding secrets in various (non-text) popular files.☆48Updated last month
- ☆57Updated 2 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆103Updated 8 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- ☆100Updated 2 years ago
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆36Updated 10 years ago
- Extract credentials and other useful info from network captures☆72Updated 2 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆53Updated 6 months ago
- Modular framework to exploit UPS devices☆62Updated 2 years ago
- Script to perform some hashcracking logic automagically☆73Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆61Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Multiplatform Telegram Bot in pure PowerShell☆52Updated 2 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 11 months ago
- This project is aimed at freely providing technical guides on various hacking tools.☆118Updated last year
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆18Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago