Capture handshakes of nearby WiFi networks automatically
☆778May 19, 2021Updated 4 years ago
Alternatives and similar repositories for hashcatch
Users that are interested in hashcatch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,076Jan 15, 2021Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆364Aug 24, 2025Updated 6 months ago
- Automatically scans nearby WiFi networks, de-authenticates clients and tries to capture the four way handshake that can be later used to …☆20Aug 9, 2025Updated 7 months ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 5 years ago
- Bash post exploitation toolkit☆746Mar 8, 2026Updated 2 weeks ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,810Updated this week
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,571Mar 11, 2026Updated last week
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,342Mar 13, 2026Updated last week
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆541Apr 14, 2021Updated 4 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- PowerShell ReverseTCP Shell - Framework☆1,064Sep 18, 2022Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Dec 8, 2022Updated 3 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,821Nov 19, 2024Updated last year
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Search gtfobins and lolbas files from your terminal☆462Jul 13, 2022Updated 3 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 6 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆249Sep 9, 2021Updated 4 years ago
- A script that automates generation of OpenSSL reverse shells☆303Sep 24, 2020Updated 5 years ago
- A framework for wireless pentesting.☆1,230Oct 14, 2020Updated 5 years ago
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago
- TotalRecon installs all the recon tools you need☆465Jul 3, 2020Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Mass scan IPs for vulnerable services☆1,047Feb 17, 2022Updated 4 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆213Mar 27, 2022Updated 3 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,417Oct 3, 2020Updated 5 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆282Oct 2, 2020Updated 5 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,473Sep 22, 2024Updated last year
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago