vrikodar / RudrastraView external linksLinks
Make a Fake wireless access point aka Evil Twin....Easily!!
☆71Apr 22, 2023Updated 2 years ago
Alternatives and similar repositories for Rudrastra
Users that are interested in Rudrastra are comparing it to the libraries listed below
Sorting:
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆17May 2, 2024Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆57Sep 22, 2022Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- Will disable windows defender at first and then run PowerShell as administrator to run the download code.☆13Sep 20, 2021Updated 4 years ago
- Enable Monitor mode & Packet Injection in Raspberry Pi☆24Nov 13, 2021Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 4 years ago
- A GUI version of the PhoneSpoit CLI tool.☆16Jan 15, 2025Updated last year
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Jul 18, 2024Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Setup a AES Encrypted communication Between two machines Right from terminal☆17Sep 2, 2021Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- Hack vulnerable Wi-Fi networks using Termux (rooted)☆13Oct 11, 2023Updated 2 years ago
- This project uses an ESP32-Cam connected to a motion sensor. When the motion sensor is activated, a photo will be submitted to the desire…☆11Sep 4, 2021Updated 4 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Beef Over AWS is a tool that allows you to use Beef-XSS over WAN securly and anonymously.☆40Oct 4, 2021Updated 4 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- WiFi Pineapple Community Packages☆12Nov 6, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Jul 19, 2024Updated last year
- This script will you help to find the information about the website and to help in penetrating testing☆112Sep 27, 2025Updated 4 months ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆12Jun 25, 2019Updated 6 years ago
- Collecting, processing and presenting information about WiFi access points and their geolocation. A versatile wardriving command center.☆15Feb 7, 2026Updated last week
- ☆12Mar 4, 2023Updated 2 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago