A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing
☆361Aug 24, 2025Updated 6 months ago
Alternatives and similar repositories for airbash
Users that are interested in airbash are comparing it to the libraries listed below
Sorting:
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- A framework for wireless pentesting.☆1,229Oct 14, 2020Updated 5 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆469Jul 21, 2020Updated 5 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,807Feb 23, 2026Updated last week
- Capture handshakes of nearby WiFi networks automatically☆776May 19, 2021Updated 4 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,070Jan 15, 2021Updated 5 years ago
- Empire client application☆504Mar 10, 2022Updated 3 years ago
- Pop shells like a master.☆1,489Apr 2, 2019Updated 6 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159May 1, 2024Updated last year
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆736Feb 5, 2019Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,194Oct 24, 2018Updated 7 years ago
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 5 months ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Apr 13, 2017Updated 8 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago
- The Traditional Swiss Army Knife for OSINT☆557Jun 10, 2021Updated 4 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,466Sep 22, 2024Updated last year
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- Tool to scan for secret files on HTTP servers☆2,103Feb 4, 2026Updated 3 weeks ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,602Oct 4, 2024Updated last year
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago