secgroundzero / warberryLinks
WarBerryPi - Tactical Exploitation
☆2,220Updated 5 years ago
Alternatives and similar repositories for warberry
Users that are interested in warberry are comparing it to the libraries listed below
Sorting:
- 📡 A python program to create a fake AP and sniff data.☆1,675Updated 5 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,234Updated 3 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,127Updated 5 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,502Updated 7 years ago
- wireless hacking - This is automated wireless hacking tool☆1,257Updated 2 years ago
- SSH man-in-the-middle tool☆1,661Updated 3 years ago
- A framework for wireless pentesting.☆1,211Updated 4 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 6 years ago
- powerful auto-backdooring utility☆747Updated 7 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,847Updated 11 months ago
- Command line utility for searching and downloading exploits☆1,775Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆1,335Updated 6 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,027Updated 5 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,358Updated 6 years ago
- All your IPs are belong to us.☆670Updated 7 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆870Updated 7 years ago
- A fast and stealthy credential harvester☆625Updated last year
- online port scan scraper☆1,118Updated last year
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,095Updated 6 years ago
- ☆1,328Updated 2 years ago
- Advanced CPU-based password recovery utility☆2,149Updated 2 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,249Updated 8 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- A tool to dump the login password from the current linux user☆3,965Updated 2 years ago
- Sniffs sensitive data from interface or pcap☆1,756Updated last year
- A demo of overriding what's in a person's clipboard☆1,433Updated last year
- Create randomly insecure VMs☆2,685Updated 2 weeks ago
- A database of common, interesting or useful commands, in one handy referable form☆748Updated last year
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,700Updated 3 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago