Capture handshakes of nearby WiFi networks automatically
☆778May 19, 2021Updated 4 years ago
Alternatives and similar repositories for hashcatch
Users that are interested in hashcatch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,078Jan 15, 2021Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆365Aug 24, 2025Updated 7 months ago
- Automatically scans nearby WiFi networks, de-authenticates clients and tries to capture the four way handshake that can be later used to …☆20Aug 9, 2025Updated 8 months ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Bash post exploitation toolkit☆748Apr 1, 2026Updated last week
- Get clients and access points.☆49Aug 28, 2019Updated 6 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,818Updated this week
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,619Mar 28, 2026Updated 2 weeks ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,357Apr 2, 2026Updated last week
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 8 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- PowerShell ReverseTCP Shell - Framework☆1,065Sep 18, 2022Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Dec 8, 2022Updated 3 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,829Nov 19, 2024Updated last year
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 8 years ago
- Search gtfobins and lolbas files from your terminal☆463Jul 13, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automated 802.1x Bypass☆88Mar 11, 2020Updated 6 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆249Sep 9, 2021Updated 4 years ago
- A script that automates generation of OpenSSL reverse shells☆303Sep 24, 2020Updated 5 years ago
- A framework for wireless pentesting.☆1,234Oct 14, 2020Updated 5 years ago
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago
- TotalRecon installs all the recon tools you need☆464Jul 3, 2020Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆249Jun 19, 2024Updated last year
- Mass scan IPs for vulnerable services☆1,047Feb 17, 2022Updated 4 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,418Oct 3, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆283Oct 2, 2020Updated 5 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆214Mar 27, 2022Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,480Sep 22, 2024Updated last year
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago