s0i37 / karmaLinks
karma WiFi attack implementation
☆54Updated last year
Alternatives and similar repositories for karma
Users that are interested in karma are comparing it to the libraries listed below
Sorting:
- My Wi-Fi scripts☆52Updated last year
- exfiltration/infiltration toolkit☆48Updated last year
- Useful collection of scapy-scripts and more☆32Updated last year
- Collection of antivirus bypass techniques☆12Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆110Updated 2 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆115Updated 3 weeks ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆134Updated last year
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆36Updated 11 years ago
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- A WLAN red team framework.☆155Updated last year
- Legba recipes.☆51Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- 1C RAS Offensive Security Tool☆27Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- Mass bruteforce authentication of common services with common credentials.☆51Updated last year
- ☆56Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- Kali Packerge Manager☆64Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 2 years ago
- Finding secrets in various (non-text) popular files.☆50Updated last month
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆83Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year