xdavidhu / lanGhost
π» A LAN dropbox chatbot controllable via Telegram
β360Updated 5 years ago
Alternatives and similar repositories for lanGhost:
Users that are interested in lanGhost are comparing it to the libraries listed below
- Pastejacking - PasteZortβ85Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]β225Updated 3 years ago
- WiFi-autopwner: script to automate searching and auditing Wi-Fi networks with weak securityβ229Updated 6 years ago
- Remote administration service which uses twitter as a command and control serverβ713Updated 4 years ago
- π· A lightning fast multithreaded network scanner framework with modules.β324Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ372Updated last year
- 3WiFi Wireless Databaseβ250Updated 2 years ago
- Exploit Netwave and GoAhead IP Cameraβ245Updated 6 years ago
- The best DOS Tool Out There!β22Updated 8 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.β437Updated 7 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β231Updated 4 years ago
- Terminator metasploit payload generatorβ178Updated 6 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. Thisβ¦β281Updated 7 years ago
- Linux bash script automation for metasploitβ264Updated 5 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.β265Updated 11 years ago
- The Hacker's ToolBoxβ187Updated 7 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.β138Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β439Updated 7 years ago
- The hackers tool beltβ520Updated 6 years ago
- Inject malicious code into *.debsβ274Updated 2 years ago
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploitiβ¦β135Updated 7 years ago
- A powerful and extensible wireless drop boxβ266Updated 6 years ago
- NXcrypt - 'python backdoor' frameworkβ365Updated 7 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.β268Updated 4 years ago
- An (un-)ethical hacking-station based on Raspberry Pi and Pythonβ210Updated 7 years ago
- Multiplatform payload dropperβ272Updated 3 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestrationβ286Updated 2 years ago
- Cloak can backdoor any python script with some tricks.β493Updated 5 years ago
- Advanced Hash Manipulationβ178Updated 5 years ago
- Find your wireless network password in Windows , Linux and Mac OSβ350Updated 4 years ago