s0lst1c3 / sentrygunView external linksLinks
Rogue AP killer
☆91Jan 24, 2018Updated 8 years ago
Alternatives and similar repositories for sentrygun
Users that are interested in sentrygun are comparing it to the libraries listed below
Sorting:
- ☆15Jan 21, 2020Updated 6 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Nov 10, 2019Updated 6 years ago
- Python script for peforming basic Evil Twin attacks on open wifi networks. Written for my tutorial on the subject.☆38Sep 20, 2016Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- strings for a Linux process' address space☆51Jun 15, 2013Updated 12 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,457Sep 22, 2024Updated last year
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Mar 11, 2018Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Respounder detects presence of responder in the network.☆322Jun 15, 2019Updated 6 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆262Sep 12, 2016Updated 9 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Sep 21, 2018Updated 7 years ago
- The USB host security assessment tool☆286Nov 28, 2018Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- Tools and scripts for penetration testing☆19Jun 28, 2020Updated 5 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago