sealingtech / wifi-ctfLinks
A simulated WiFi capture the flag setup
☆15Updated 2 years ago
Alternatives and similar repositories for wifi-ctf
Users that are interested in wifi-ctf are comparing it to the libraries listed below
Sorting:
- A simulation of the RFCTF KOTH game.☆10Updated 4 years ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- Session scripts.☆47Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- wordlists for password cracking☆28Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆15Updated 3 weeks ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Updated 3 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆14Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated last year
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- tool to rick roll access.logs☆17Updated 6 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- scavenger is a ruby brute forcing script that uses Typhoeus gem to enable parallelization and sends multiple http requests with various p…☆11Updated 3 years ago
- Packet injection for wifi; simplified.☆36Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 11 months ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 2 years ago
- Rubber Ducky powered by NeoKey☆25Updated last year
- Script to help build a Hacking lab on Debian based distros like Kali, Parrot, and Ubuntu☆13Updated 6 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated 11 months ago