secgroundzero / warberryLinks
WarBerryPi - Tactical Exploitation
β2,226Updated 6 years ago
Alternatives and similar repositories for warberry
Users that are interested in warberry are comparing it to the libraries listed below
Sorting:
- π‘ A python program to create a fake AP and sniff data.β1,690Updated 6 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercapβ2,495Updated 7 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pacβ¦β2,260Updated 4 years ago
- wireless hacking - This is automated wireless hacking toolβ1,281Updated 3 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.β1,092Updated 6 years ago
- A framework for wireless pentesting.β1,228Updated 5 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3β3,150Updated 5 years ago
- A fast and stealthy credential harvesterβ628Updated 2 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitMβ1,096Updated 7 years ago
- All your IPs are belong to us.β676Updated 7 years ago
- A PoC backdoor that uses Gmail as a C&C serverβ1,344Updated 7 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.β1,733Updated 4 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplβ¦β583Updated 8 years ago
- wide range mass audit toolkitβ1,033Updated 7 years ago
- SSH man-in-the-middle toolβ1,732Updated 4 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.β1,017Updated 10 years ago
- Python and Powershell internal penetration testing frameworkβ720Updated 9 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.β1,861Updated 3 years ago
- Command line utility for searching and downloading exploitsβ1,808Updated 4 months ago
- online port scan scraperβ1,119Updated 2 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.β1,864Updated last year
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decryβ¦β1,118Updated 8 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the rβ¦β3,214Updated 2 months ago
- Inject code and spy on wifi usersβ2,613Updated 4 years ago
- Sniffs sensitive data from interface or pcapβ1,810Updated 2 years ago
- powerful auto-backdooring utilityβ748Updated 8 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdooβ¦β1,261Updated 9 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.β1,029Updated 6 years ago
- Snoopy: A distributed tracking and data interception frameworkβ609Updated 13 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing β¦β592Updated 3 years ago