sud0nick / CursedScreech
A mass communicator module for the WiFi Pineapple that utilizes TLS to control a botnet of compromised systems.
☆15Updated 4 years ago
Alternatives and similar repositories for CursedScreech:
Users that are interested in CursedScreech are comparing it to the libraries listed below
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆22Updated 3 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- ☆24Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- An Raspberry PI 2 OpenWRT Image Setup To Be A Wireless Hacking Sandbox☆35Updated 9 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- MS17-010☆12Updated 7 years ago
- Get clients and access points.☆49Updated 5 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 9 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆39Updated 4 years ago
- Framework for Man-In-The-Middle attacks☆15Updated 7 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.☆16Updated 6 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Easy Window domain access☆51Updated 11 years ago
- giskismet – Wireless recon visualization tool☆53Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Software exploitation training material☆15Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Automatically exported from code.google.com/p/surfjack - not actively maintained☆9Updated 10 years ago