giskismet – Wireless recon visualization tool
☆55Aug 26, 2016Updated 9 years ago
Alternatives and similar repositories for giskismet
Users that are interested in giskismet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Network based protocol fuzzer☆74Feb 17, 2022Updated 4 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A tool to list plugins installed on a wordpress powered website.☆11Jun 20, 2024Updated last year
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Cross-platform radio signal visualizer for HackRF & other SDR platforms.☆17Oct 1, 2020Updated 5 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆42Oct 13, 2010Updated 15 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,267Dec 18, 2021Updated 4 years ago
- Imported from https://gitorious.org/beagleboard-usbsniffer/☆15Oct 19, 2015Updated 10 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- A cookbook for managing the local security policy on a Windows system☆13Apr 13, 2021Updated 4 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Kismet "GUI" script running on a Raspberry Pi☆54Dec 14, 2025Updated 3 months ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆24May 8, 2018Updated 7 years ago
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- ☆33Oct 5, 2016Updated 9 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- iPhone Backup Analyzer☆34Dec 7, 2012Updated 13 years ago
- Scripts to aid in the manipulation of electromagnetic radiation (for use with gnu_radio and SDR).☆79Sep 4, 2017Updated 8 years ago
- experiments in SDR-based pseudo-doppler direction finding☆24Jan 9, 2023Updated 3 years ago
- A bucket of various work-in-progress rtl-sdr ideas.☆22Mar 5, 2017Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- a 2.4 GHz SDR neighbor using 1 bit ADC☆30Dec 6, 2021Updated 4 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Hacker tools for GNURoot Debian Android app☆14May 31, 2018Updated 7 years ago