s0i37 / karma
karma WiFi attack implementation
☆44Updated last month
Related projects ⓘ
Alternatives and complementary repositories for karma
- Useful collection of scapy-scripts and more☆24Updated 5 months ago
- exfiltration/infiltration toolkit☆41Updated 3 weeks ago
- GitHub CVE Repository Hunt☆16Updated 4 months ago
- 1C RAS Offensive Security Tool☆24Updated last year
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆32Updated 10 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- VLAN ID Parser☆5Updated 6 months ago
- Kali Packerge Manager☆50Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- My Wi-Fi scripts☆44Updated 5 months ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 4 years ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆27Updated last year
- Fast Path Traversal exploitation tool☆21Updated 7 months ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆31Updated 3 years ago
- TeaVin - Ultimate ESP32 EvilTwin☆11Updated 8 months ago
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Modular framework to exploit UPS devices☆61Updated last year
- ☆56Updated last year
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- Windows priviledge escalation script☆13Updated last year
- A swiss army knife for pentesting networks☆24Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆38Updated 7 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated last month
- A script to automate keystrokes through a graphical desktop program.☆33Updated 3 weeks ago
- PowerShell Obfuscator☆93Updated 5 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆35Updated 9 months ago