secgroundzero / warberryLinks
WarBerryPi - Tactical Exploitation
β2,228Updated 6 years ago
Alternatives and similar repositories for warberry
Users that are interested in warberry are comparing it to the libraries listed below
Sorting:
- π‘ A python program to create a fake AP and sniff data.β1,687Updated 6 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pacβ¦β2,255Updated 4 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercapβ2,494Updated 7 years ago
- wireless hacking - This is automated wireless hacking toolβ1,279Updated 3 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3β3,148Updated 5 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.β1,092Updated 6 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitMβ1,098Updated 7 years ago
- A PoC backdoor that uses Gmail as a C&C serverβ1,343Updated 7 years ago
- Python and Powershell internal penetration testing frameworkβ719Updated 9 years ago
- A fast and stealthy credential harvesterβ628Updated 2 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.β1,732Updated 3 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdooβ¦β1,259Updated 9 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.β1,863Updated last year
- A framework for wireless pentesting.β1,227Updated 5 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.β1,027Updated 5 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplβ¦β583Updated 8 years ago
- powerful auto-backdooring utilityβ751Updated 8 years ago
- β1,330Updated 2 years ago
- an open source ransomware honeypotβ906Updated 9 years ago
- All your IPs are belong to us.β673Updated 7 years ago
- SSH man-in-the-middle toolβ1,730Updated 4 years ago
- A fully featured backdoor that uses Twitter as a C&C serverβ785Updated 5 years ago
- Inject code and spy on wifi usersβ2,611Updated 4 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons coβ¦β6,428Updated 7 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.β867Updated 8 years ago
- Snoopy: A distributed tracking and data interception frameworkβ609Updated 13 years ago
- A collection of cheatsheets for various infosec tools and topics.β813Updated 4 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes witβ¦β1,247Updated 7 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7β872Updated 8 years ago
- Network Security Monitoring on Raspberry Pi type devicesβ791Updated 7 years ago