skickar / CatGotYourPasswordLinks
Repo for Missoula class
☆23Updated last year
Alternatives and similar repositories for CatGotYourPassword
Users that are interested in CatGotYourPassword are comparing it to the libraries listed below
Sorting:
- RF-modulated high fidelity laser microphone and keystroke sniffer☆80Updated last year
- ☆24Updated last year
- OSDP attack tool (and the Elvish word for friend)☆105Updated 2 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- ☆36Updated last week
- Legba recipes.☆51Updated last year
- Rust-based password mutator for brute force attacks☆13Updated 8 months ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Updated 5 years ago
- The Tick is the next evolution in covert access control system implants for simulating adversary-in-the-middle attacks.☆163Updated 2 months ago
- Haschcat Rules processor☆14Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- ☆19Updated last year
- Signing-key abuse and update exploitation framework☆131Updated 6 months ago
- A command-line utility that scans for Wi-Fi networks using the 802.11 netlink API.☆34Updated 9 months ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆42Updated 10 months ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabil…☆99Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆25Updated this week
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆17Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Updated 2 months ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆50Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Encodes a message using emojis based on a specified pattern.☆18Updated last year
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- Our fork of Iceman's fork for Proxmark III☆17Updated 11 months ago
- Signal Tracking & Detection☆17Updated this week
- ☆72Updated 4 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆138Updated last year
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆139Updated 2 weeks ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Updated 2 years ago