secgroundzero / warberryLinks
WarBerryPi - Tactical Exploitation
☆2,222Updated 5 years ago
Alternatives and similar repositories for warberry
Users that are interested in warberry are comparing it to the libraries listed below
Sorting:
- 📡 A python program to create a fake AP and sniff data.☆1,679Updated 5 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,500Updated 7 years ago
- wireless hacking - This is automated wireless hacking tool☆1,263Updated 2 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,091Updated 6 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,235Updated 3 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,127Updated 5 years ago
- A fast and stealthy credential harvester☆628Updated 2 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Updated 7 years ago
- A framework for wireless pentesting.☆1,214Updated 4 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,342Updated 6 years ago
- powerful auto-backdooring utility☆749Updated 7 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,254Updated 8 years ago
- All your IPs are belong to us.☆670Updated 7 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,728Updated 3 years ago
- Python and Powershell internal penetration testing framework☆719Updated 9 years ago
- Inject code and spy on wifi users☆2,604Updated 4 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 7 years ago
- Sniffs sensitive data from interface or pcap☆1,771Updated last year
- wide range mass audit toolkit☆1,030Updated 6 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,855Updated last year
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,386Updated 6 years ago
- SSH man-in-the-middle tool☆1,683Updated 4 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆863Updated 8 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆781Updated 4 years ago
- an open source ransomware honeypot☆900Updated 9 years ago
- A collection of cheatsheets for various infosec tools and topics.☆814Updated 4 years ago
- Snoopy: A distributed tracking and data interception framework☆606Updated 12 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆870Updated 8 years ago
- online port scan scraper☆1,119Updated 2 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,029Updated 5 years ago