s0i37 / wifiView external linksLinks
My Wi-Fi scripts
☆51Jun 23, 2024Updated last year
Alternatives and similar repositories for wifi
Users that are interested in wifi are comparing it to the libraries listed below
Sorting:
- karma WiFi attack implementation☆55Oct 23, 2024Updated last year
- Useful collection of scapy-scripts and more☆32Jun 23, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- Effortlessly Find Comprehensive Information on Individuals with Our dedsec People Search Tool!☆34Apr 17, 2025Updated 9 months ago
- ☆18Sep 14, 2023Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- A Ghidra extension for reverse-engineering macOS binaries.☆19Jan 13, 2025Updated last year
- ☆26Jan 7, 2024Updated 2 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- A simple way to track *unix devices☆21Mar 7, 2023Updated 2 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆28Jan 22, 2025Updated last year
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 3 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Aug 20, 2024Updated last year
- Apple Blocks Plugin for Binary Ninja☆33Sep 7, 2025Updated 5 months ago
- ☆42Jun 1, 2025Updated 8 months ago
- Symbol REPL☆31Mar 4, 2018Updated 7 years ago
- ☆29Oct 15, 2023Updated 2 years ago
- ☆10Feb 5, 2026Updated last week
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆18Dec 18, 2025Updated last month
- ☆27Feb 26, 2023Updated 2 years ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆14Oct 23, 2025Updated 3 months ago
- ME314 Introduction to Data Science and Big Data Analytics 2018☆10Jul 29, 2018Updated 7 years ago
- ☆16Sep 4, 2024Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- New phishing tool with 30+ templates updated tool☆10Feb 2, 2024Updated 2 years ago
- An all-in-one WiFi pentesting tool designed to automate and simplify WiFi security auditing and attacks — phishing, SSID spam, DoS, and m…☆32Jun 24, 2025Updated 7 months ago
- Hackings style defence tricks☆58Dec 30, 2025Updated last month
- DD Liberator 3D Gun Blueprint☆13May 10, 2013Updated 12 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- How to download Restricted Media on Telegram Web☆12Dec 14, 2022Updated 3 years ago
- a simple chat server for the esp8266.☆10May 19, 2021Updated 4 years ago
- Sign in with Apple (apple JWS token)☆11Jul 22, 2022Updated 3 years ago