My Wi-Fi scripts
☆51Jun 23, 2024Updated last year
Alternatives and similar repositories for wifi
Users that are interested in wifi are comparing it to the libraries listed below
Sorting:
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- Useful collection of scapy-scripts and more☆32Jun 23, 2024Updated last year
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- Effortlessly Find Comprehensive Information on Individuals with Our dedsec People Search Tool!☆35Apr 17, 2025Updated 10 months ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- Custom instruction length for hex-rays☆28Jan 17, 2026Updated last month
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆26May 6, 2025Updated 10 months ago
- DEDSEC_BKIF is a keystroke injection tool for Android, Linux, and iOS.☆24Jan 19, 2026Updated last month
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- ☆26Jan 7, 2024Updated 2 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- A simple way to track *unix devices☆21Mar 7, 2023Updated 2 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 3 years ago
- reverse socks tunneler with ntlm and proxy support☆60Aug 9, 2022Updated 3 years ago
- Self-localisation of an ESP8266 using the Google Maps API☆24Oct 20, 2017Updated 8 years ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- Apache server-status link parser☆24Jul 19, 2019Updated 6 years ago
- New generation parallel executer written in Go☆30Dec 18, 2023Updated 2 years ago
- Apple Blocks Plugin for Binary Ninja☆33Sep 7, 2025Updated 5 months ago
- Symbol REPL☆31Mar 4, 2018Updated 8 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- ☆29Oct 15, 2023Updated 2 years ago
- ☆10Feb 27, 2026Updated last week
- ☆73Aug 19, 2025Updated 6 months ago
- IP range distributed scanner for vulnerable Hikvision cameras☆27Jul 10, 2019Updated 6 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆34Aug 26, 2021Updated 4 years ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆35Feb 4, 2023Updated 3 years ago
- Bluetooth speaker killer☆34Jun 1, 2024Updated last year
- Steam link Bluetooth controller Companion. Support for keyboard and mouse.☆10Oct 18, 2018Updated 7 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Different methods to obfuscate URLs☆29Nov 9, 2017Updated 8 years ago
- ME314 Introduction to Data Science and Big Data Analytics 2018☆10Jul 29, 2018Updated 7 years ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago