s0i37 / wifiLinks
My Wi-Fi scripts
☆52Updated last year
Alternatives and similar repositories for wifi
Users that are interested in wifi are comparing it to the libraries listed below
Sorting:
- karma WiFi attack implementation☆54Updated last year
- exfiltration/infiltration toolkit☆48Updated last year
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆36Updated 11 years ago
- Useful collection of scapy-scripts and more☆32Updated last year
- ☆103Updated last year
- ☆56Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64Updated 2 years ago
- Cisco IOS Security Inspector☆37Updated last month
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Kali Packerge Manager☆64Updated 2 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 2 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆115Updated 3 weeks ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Various wordlists for bruteforce☆35Updated 4 years ago
- Collection of extra pentest tools for Kali Linux☆110Updated 2 months ago
- Legba recipes.☆51Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- 1C RAS Offensive Security Tool☆27Updated 2 years ago
- Bundle of common passwords targeting RUSSIAN-speaking audience (parsed from big data leaks)☆105Updated 6 years ago
- Fetching passwords from the chrome browser database☆93Updated 2 years ago
- Viber Osint helper tool to save your time through automation and help you find registered users.☆55Updated 2 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated last month
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Collection of antivirus bypass techniques☆12Updated 2 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆83Updated 3 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 2 years ago
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆52Updated last year
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago