secgroundzero / warberryLinks
WarBerryPi - Tactical Exploitation
β2,225Updated 6 years ago
Alternatives and similar repositories for warberry
Users that are interested in warberry are comparing it to the libraries listed below
Sorting:
- π‘ A python program to create a fake AP and sniff data.β1,686Updated 6 years ago
- wireless hacking - This is automated wireless hacking toolβ1,276Updated 3 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pacβ¦β2,255Updated 4 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitMβ1,099Updated 7 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercapβ2,494Updated 7 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3β3,146Updated 5 years ago
- A framework for wireless pentesting.β1,226Updated 5 years ago
- A PoC backdoor that uses Gmail as a C&C serverβ1,344Updated 7 years ago
- A fast and stealthy credential harvesterβ630Updated 2 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.β1,092Updated 6 years ago
- Inject code and spy on wifi usersβ2,611Updated 4 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.β1,860Updated 2 years ago
- wide range mass audit toolkitβ1,031Updated 7 years ago
- powerful auto-backdooring utilityβ751Updated 8 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdooβ¦β1,257Updated 8 years ago
- an open source ransomware honeypotβ904Updated 9 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons coβ¦β6,419Updated 7 years ago
- A command line tool to detect shared passwordsβ403Updated 9 years ago
- online port scan scraperβ1,118Updated 2 years ago
- β1,330Updated 2 years ago
- SSH man-in-the-middle toolβ1,729Updated 4 years ago
- Python and Powershell internal penetration testing frameworkβ719Updated 9 years ago
- Command line utility for searching and downloading exploitsβ1,791Updated 3 months ago
- A fully featured backdoor that uses Twitter as a C&C serverβ785Updated 5 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.β1,019Updated 10 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes witβ¦β1,249Updated 7 years ago
- Network Security Monitoring on Raspberry Pi type devicesβ792Updated 7 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the rβ¦β3,194Updated last month
- Snoopy: A distributed tracking and data interception frameworkβ610Updated 13 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplβ¦β583Updated 8 years ago