sensepost / net-credsLinks
Sniffs sensitive data from interface or pcap
☆14Updated 7 years ago
Alternatives and similar repositories for net-creds
Users that are interested in net-creds are comparing it to the libraries listed below
Sorting:
- Framework for Man-In-The-Middle attacks☆14Updated 7 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- ☆33Updated 11 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Updated 5 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 3 weeks ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Get clients and access points.☆48Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- One-off scripts☆52Updated 8 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Updated 11 years ago
- Simple Karma Attack☆68Updated 5 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- ☆15Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- Post-exploitation NTLM password hash extractor☆19Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago