Herramienta ideal para el despliegue automatizado de un Rogue AP con capacidad de selección de plantilla + 2FA. No requiere de conexión cableada.
☆604Sep 12, 2021Updated 4 years ago
Alternatives and similar repositories for evilTrust
Users that are interested in evilTrust are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Herramienta hecha en Bash ideal para automatizar ataques WiFi (WPA/WPA2 - PSK) destinados a la obtención de la contraseña.☆429Nov 28, 2023Updated 2 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆161May 1, 2024Updated 2 years ago
- Programa ideal para el Spoofing de llamadas y mensajería instantánea (SMS) desde terminal.☆169Nov 3, 2019Updated 6 years ago
- Herramienta ideal para obtener una Fully Shell interactiva vía HTTP, sin necesidad de hacer Reverse Shell.☆110Nov 28, 2023Updated 2 years ago
- Programa para gestionar WhatsApp desde terminal, ideal para robar/gestionar sesiones tras haber ganar acceso a un dispositivo móvil.☆82Nov 3, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Herramienta ideal para la inspección de transacciones en el servicio de exploración de bloques de Bitcoin.☆97Oct 26, 2022Updated 3 years ago
- Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https://…☆65Nov 3, 2019Updated 6 years ago
- Cliente de terminal hecho en Bash ideal para trabajar cómodamente desde consola sobre la plataforma de HackTheBox.☆266Aug 31, 2021Updated 4 years ago
- Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.☆103Nov 28, 2023Updated 2 years ago
- Página web personal. Artículos sobre ciberseguridad, CTFs e investigaciones.☆407Mar 14, 2023Updated 3 years ago
- Herramienta enfocada al Networking, para auditorias o bien para gastar bromas en nuestra Red Wifi o a otras Redes Wifi. [NO ME HAGO RESPO…☆170Oct 20, 2023Updated 2 years ago
- Herramienta enfocada a Blindar/Proteger nuestro equipo para que todo rastro que deje en Internet o en Redes Locales sea Falso e Inrasteab…☆30Sep 1, 2023Updated 2 years ago
- Enlace donde voy a compartir un fichero de obsidian con la recopilación de todos mis apuntes de varias ramas de informática con los segui…☆372Oct 21, 2024Updated last year
- Instala configuración de @s4vitar,@vowkn y @kyb3rvizsla en dos clicks 😀☆22Jan 15, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- Este script añade la config de s4vitar a bspwm automaticamente!☆303Mar 4, 2024Updated 2 years ago
- Exfiltrate all saved Wi-Fi passwords from a Windows PC☆13Sep 14, 2023Updated 2 years ago
- simple SMS-BOMBER and SMS Sender made with python work for Windows and Linux☆370Feb 13, 2023Updated 3 years ago
- Simple Python botnet.☆11Jul 8, 2022Updated 3 years ago
- Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.☆108Aug 1, 2025Updated 9 months ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- Configuration files for desktop environment☆24Feb 20, 2024Updated 2 years ago
- Herramienta para hacking wifi con múltiples opciones.☆49Aug 12, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Updated this week
- ☆65May 21, 2023Updated 2 years ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Feb 20, 2023Updated 3 years ago
- Local File Inclusion Enumeration (PoC)☆59Jul 2, 2024Updated last year
- 🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.☆58Apr 14, 2025Updated last year
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Aug 12, 2024Updated last year
- iptables rules to only have incoming connections from the machine on TryHackMe☆222Oct 28, 2021Updated 4 years ago
- Local File Inclusion Scanner and Exploiter☆15Dec 28, 2021Updated 4 years ago
- Phising 2FA Gmail☆113Jul 10, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Local File Inclusion To Remote Command Execution (PoC)☆50Apr 10, 2023Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Aug 17, 2022Updated 3 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆180Jun 10, 2024Updated last year
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆18Jul 21, 2024Updated last year
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,091Apr 22, 2022Updated 4 years ago
- Make your terminal interactive with auto-suggestion, syntax-highlighting and your own banner!☆52Feb 25, 2026Updated 2 months ago