Generalized Wi-Fi Client Isolation Bypasses
☆727Mar 13, 2026Updated last month
Alternatives and similar repositories for airsnitch
Users that are interested in airsnitch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆562Oct 3, 2025Updated 6 months ago
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆19Nov 8, 2024Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- ☆16Dec 7, 2025Updated 4 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- RTL-SDR front-end for TETRA/telive - replaces GnuRadio with a single C binary☆31Feb 19, 2026Updated 2 months ago
- Recovered samples, extracted Wasm/binaries, decoded payloads & analysis scripts from the Coruna iOS/macOS exploit kit (b27.icu). 28 JS mo…☆54Mar 9, 2026Updated last month
- ☆16Jan 9, 2025Updated last year
- ☆19Dec 18, 2024Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- ☆77Apr 8, 2026Updated 3 weeks ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated 3 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated 2 months ago
- Tools for flashing a USR5686G modem☆20Aug 6, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CaptainCredz is a modular and discreet password-spraying tool.☆135Jul 22, 2025Updated 9 months ago
- Training and certifications related to secure software development☆10Feb 9, 2026Updated 2 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆46Apr 14, 2024Updated 2 years ago
- UAC Bypass using UIAccess program QuickAssist☆231Nov 30, 2025Updated 5 months ago
- HUB repository for all the Catsniffer Tools available maintaned by Electronic Cats☆41Apr 24, 2026Updated last week
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆128Dec 23, 2025Updated 4 months ago
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆44Jan 6, 2026Updated 3 months ago
- HvLoader.efi is an EFI application for loading an external hypervisor loader☆74Jun 12, 2023Updated 2 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated last month
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 9 months ago
- code to be able to use multiple esp32 to simulatnaiously scan for wifi networks across multiple other esp32☆19Apr 5, 2024Updated 2 years ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆128Jan 29, 2026Updated 3 months ago
- PowerShell implementation for AD CS☆143Mar 2, 2026Updated 2 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Fast context enumeration for newly obtained Active Directory credentials.☆87Apr 17, 2026Updated 2 weeks ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆386Oct 14, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated last year
- Every GitHub repo mentioning OSCP — hunted, cloned, read by AI, judged by a human. 399 clean repos.☆78Mar 5, 2026Updated last month
- Escaping Restricted Environments and Bypassing DLP☆79Jan 22, 2019Updated 7 years ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆85Apr 2, 2025Updated last year
- Repo hacks☆21Dec 7, 2025Updated 4 months ago
- Ludus range for the Constructing Defense Lab☆119Apr 21, 2026Updated last week