sealingtech / wifi-ctfLinks
A simulated WiFi capture the flag setup
☆16Updated 2 years ago
Alternatives and similar repositories for wifi-ctf
Users that are interested in wifi-ctf are comparing it to the libraries listed below
Sorting:
- A simulation of the RFCTF KOTH game.☆10Updated 5 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆17Updated 6 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆17Updated 2 weeks ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- Our fork of Iceman's fork for Proxmark III☆17Updated 10 months ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Zero-Day Code Injection and Persistence Technique☆34Updated 8 years ago
- Session scripts.☆48Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- A lightweight ducky script generator written in python.☆30Updated 4 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated 3 weeks ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆16Updated 4 years ago
- privilege escalation by piggy-backing user sudo requests☆16Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 2 years ago
- Packet injection for wifi; simplified.☆38Updated 2 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 5 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆25Updated last week
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆28Updated 7 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 3 months ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago