s0i37 / karma
karma WiFi attack implementation
☆48Updated 5 months ago
Alternatives and similar repositories for karma:
Users that are interested in karma are comparing it to the libraries listed below
- exfiltration/infiltration toolkit☆44Updated 4 months ago
- Useful collection of scapy-scripts and more☆27Updated 9 months ago
- My Wi-Fi scripts☆45Updated 9 months ago
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆34Updated 10 years ago
- Cisco IOS Security Inspector☆22Updated this week
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- hiding in plain sight: part 2☆44Updated 8 months ago
- Social Engineering Browser Update Attack.☆56Updated last year
- Port forwarding via MSRPC (445/tcp) [WIP]☆32Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆39Updated last year
- Finding secrets in various (non-text) popular files.☆24Updated 2 months ago
- Multiplatform Telegram Bot in pure PowerShell☆51Updated 2 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- 1C RAS Offensive Security Tool☆25Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- GitHub CVE Repository Hunt☆18Updated 8 months ago
- ☆16Updated 3 months ago
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- Repo for all my exploits/PoCs☆50Updated last month
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- ☆58Updated last year
- aiohttp LFI (CVE-2024-23334)☆26Updated last year
- Ready to go Phishing Platform☆40Updated 5 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 5 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆96Updated 4 months ago
- A swiss army knife for pentesting networks☆25Updated 2 years ago