A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing
☆364Aug 24, 2025Updated 6 months ago
Alternatives and similar repositories for airbash
Users that are interested in airbash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆470Jul 21, 2020Updated 5 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆213Mar 27, 2022Updated 3 years ago
- A framework for wireless pentesting.☆1,230Oct 14, 2020Updated 5 years ago
- Capture handshakes of nearby WiFi networks automatically☆778May 19, 2021Updated 4 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,076Jan 15, 2021Updated 5 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- Empire client application☆504Mar 10, 2022Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,810Updated this week
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆27Jun 19, 2020Updated 5 years ago
- Pop shells like a master.☆1,491Apr 2, 2019Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆737Feb 5, 2019Updated 7 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159May 1, 2024Updated last year
- ProtoType for a handheld device used to grab WPA four way handshakes☆40Nov 24, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,093Feb 19, 2019Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,387Jun 17, 2022Updated 3 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 5 months ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- Tool to scan for secret files on HTTP servers☆2,103Feb 4, 2026Updated last month
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- Windows passwords decryption from dump files☆513Feb 2, 2023Updated 3 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 8 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,473Sep 22, 2024Updated last year
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆2,516Aug 26, 2020Updated 5 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- SSH man-in-the-middle tool☆1,732Jul 2, 2021Updated 4 years ago
- The best way to scan for weak ssh passwords on your network☆620Dec 18, 2023Updated 2 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆79Aug 18, 2018Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,690Nov 3, 2019Updated 6 years ago