karma WiFi attack implementation
☆56Oct 23, 2024Updated last year
Alternatives and similar repositories for karma
Users that are interested in karma are comparing it to the libraries listed below
Sorting:
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- Useful collection of scapy-scripts and more☆32Jun 23, 2024Updated last year
- My Wi-Fi scripts☆51Jun 23, 2024Updated last year
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- inject and run code into arbitrary process (x86 and x64)☆14Oct 20, 2021Updated 4 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆34Aug 26, 2021Updated 4 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- Research on abusing GitLab Runners☆31Jul 14, 2020Updated 5 years ago
- Hackings style defence tricks☆58Dec 30, 2025Updated 2 months ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆110May 19, 2022Updated 3 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- ✅ CTF participation Telegram Bot☆14Aug 5, 2022Updated 3 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Jul 2, 2019Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- ☆11Apr 8, 2024Updated last year
- ☆29Oct 15, 2023Updated 2 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- ☆14Jul 10, 2025Updated 7 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆38Feb 14, 2026Updated 3 weeks ago
- ☆18Sep 14, 2023Updated 2 years ago
- ☆13Dec 12, 2021Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Jul 3, 2021Updated 4 years ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆35Feb 4, 2023Updated 3 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Jun 14, 2024Updated last year
- Learn basic crypto in 2 hours☆16Nov 25, 2021Updated 4 years ago
- Finding secrets in various (non-text) popular files.☆52Oct 21, 2025Updated 4 months ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago