secgroundzero / warberryLinks
WarBerryPi - Tactical Exploitation
☆2,226Updated 6 years ago
Alternatives and similar repositories for warberry
Users that are interested in warberry are comparing it to the libraries listed below
Sorting:
- 📡 A python program to create a fake AP and sniff data.☆1,691Updated 6 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Updated 6 years ago
- wireless hacking - This is automated wireless hacking tool☆1,281Updated 3 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,260Updated 4 years ago
- A framework for wireless pentesting.☆1,228Updated 5 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Updated 7 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,495Updated 7 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 8 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,150Updated 5 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,344Updated 7 years ago
- powerful auto-backdooring utility☆748Updated 8 years ago
- wide range mass audit toolkit☆1,034Updated 7 years ago
- Command line utility for searching and downloading exploits☆1,808Updated 4 months ago
- Python and Powershell internal penetration testing framework☆720Updated 9 years ago
- A fast and stealthy credential harvester☆628Updated 2 years ago
- Snoopy: A distributed tracking and data interception framework☆609Updated 13 years ago
- A command line tool to detect shared passwords☆404Updated 9 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,214Updated 2 months ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,031Updated 6 years ago
- Inject code and spy on wifi users☆2,613Updated 4 years ago
- A modern vulnerable web app☆1,016Updated 4 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆869Updated 8 years ago
- SSH man-in-the-middle tool☆1,732Updated 4 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,733Updated 4 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,864Updated last year
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,436Updated 7 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,261Updated 9 years ago
- A demo of overriding what's in a person's clipboard☆1,434Updated 2 years ago
- online port scan scraper☆1,119Updated 2 years ago
- All your IPs are belong to us.☆676Updated 7 years ago