stryngs / scriptsLinks
A collection of various scripts I've written through the years
☆68Updated 3 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆361Updated 5 months ago
- Mobile UI for kismet☆183Updated last year
- Rogue AP killer☆91Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- Qt Port for Linux, Mac OSX and Windows☆304Updated 3 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- ☆242Updated last year
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆245Updated 5 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆60Updated 7 years ago
- Stargate☆96Updated 9 years ago
- Wiegotcha: Long Range RFID Thief☆236Updated 4 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Updated 7 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- Web Sight Docker Deployment☆122Updated 8 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- Powershell Reverse Rubber Ducky☆57Updated 10 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 7 years ago
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆70Updated 7 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- Fetch, install and search exploit archives from exploit sites.☆118Updated 2 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆169Updated 8 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆178Updated 9 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 5 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- A malicious captive wifi portal☆148Updated 5 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆19Updated 4 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- For importing, searching, and managing public password breach data☆160Updated 2 years ago