Rogue AP killer
☆92Jan 24, 2018Updated 8 years ago
Alternatives and similar repositories for sentrygun
Users that are interested in sentrygun are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Jan 21, 2020Updated 6 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Nov 10, 2019Updated 6 years ago
- Python script for peforming basic Evil Twin attacks on open wifi networks. Written for my tutorial on the subject.☆38Sep 20, 2016Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,473Sep 22, 2024Updated last year
- strings for a Linux process' address space☆51Jun 15, 2013Updated 12 years ago
- Rogue Access Point Detector☆37Sep 2, 2024Updated last year
- ☆47Nov 18, 2015Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Respounder detects presence of responder in the network.☆322Jun 15, 2019Updated 6 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 8 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆70Mar 11, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A script to test an RDP host for sticky keys and utilman backdoor.☆263Sep 12, 2016Updated 9 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Tools and scripts for penetration testing☆19Jun 28, 2020Updated 5 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Sep 21, 2018Updated 7 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago