My Wi-Fi scripts
☆51Jun 23, 2024Updated last year
Alternatives and similar repositories for wifi
Users that are interested in wifi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- Useful collection of scapy-scripts and more☆32Jun 23, 2024Updated last year
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆21Sep 10, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Effortlessly Find Comprehensive Information on Individuals with Our dedsec People Search Tool!☆35Apr 17, 2025Updated 11 months ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- 📧 [Research] E-Mail Injection: Vulnerable applications☆17May 26, 2024Updated last year
- Finding secrets in various (non-text) popular files.☆53Oct 21, 2025Updated 5 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- ☆138Jun 25, 2021Updated 4 years ago
- Hackings style defence tricks☆59Dec 30, 2025Updated 2 months ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Custom pwnagotchi plugins☆15Jan 5, 2024Updated 2 years ago
- Utility to find AES keys in running memory processes☆21Sep 10, 2023Updated 2 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- Xposed Google Photos FIX☆10Aug 11, 2023Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆79Jun 11, 2024Updated last year
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- ☆18Dec 2, 2023Updated 2 years ago
- Magic tool for managing internet connection in local network by @zalexdev☆33Jan 8, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆13May 30, 2024Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- reverse socks tunneler with ntlm and proxy support☆61Aug 9, 2022Updated 3 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- ☆44Jun 1, 2025Updated 9 months ago
- 3wifi fork☆11Aug 22, 2023Updated 2 years ago
- Compare APKs☆19Feb 28, 2024Updated 2 years ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆164May 5, 2025Updated 10 months ago
- Apple Blocks Plugin for Binary Ninja☆33Sep 7, 2025Updated 6 months ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- xortigate-cve-2023-27997☆65Oct 12, 2023Updated 2 years ago
- FVWA (Flask Vulnerable Web Application)☆17Oct 14, 2024Updated last year
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- Wordlists are generated by permutations of a list of keywords. You can configure (connectors, abbreviations, reverse, replacements ...) t…☆38Nov 1, 2018Updated 7 years ago