sealingtech / wifi-ctf
A simulated WiFi capture the flag setup
☆15Updated 2 years ago
Alternatives and similar repositories for wifi-ctf:
Users that are interested in wifi-ctf are comparing it to the libraries listed below
- Random files such as wordlists which maybe be useful for playing our game☆22Updated 7 months ago
- A simulation of the RFCTF KOTH game.☆10Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆14Updated 4 years ago
- Tools for optimizing and handling the SSID pool for the WiFi Pineapple Mark VII.☆20Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- tool to rick roll access.logs☆17Updated 6 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- Force target victim to unsafe network☆19Updated last week
- Automated network asset, email, and social media profile discovery and cataloguing.☆12Updated 3 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated 10 months ago
- 📈 SecKC Honeypot dashboard☆14Updated 7 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆11Updated 5 years ago
- Open Source and publicly modifiable knowledgebase about CyberSecurity Topics, Concepts, and Terminology. This replaces our prior repo whi…☆20Updated 2 months ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆27Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- This will be a wiki when it grows up, if it grows up☆91Updated 9 months ago
- Packet injection for wifi; simplified.☆37Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆11Updated last month
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25Updated 2 years ago
- A simple wrapper for l2ping which shows rssi☆18Updated 4 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated last year