PoC presentada en CyberCamp 2018 para crear una shell mediante tramas 802.11
☆23Nov 29, 2018Updated 7 years ago
Alternatives and similar repositories for WiFi_shell
Users that are interested in WiFi_shell are comparing it to the libraries listed below
Sorting:
- FluScan is an IPv4 Scanner for Internet designed by Flu Project Team. FluScan has been developed in Python.☆14Mar 6, 2018Updated 7 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- phpstudy批量检测mysql弱口令☆20Dec 2, 2015Updated 10 years ago
- 总结一些渗透中值得关注的默认端口☆23May 19, 2016Updated 9 years ago
- thinkphp5 远程代码执行漏洞,交互式利用脚本☆25Dec 11, 2018Updated 7 years ago
- Makes email "scary" to disrupt NSA surveillance☆36Oct 16, 2013Updated 12 years ago
- Wifi Stealer☆27Nov 13, 2020Updated 5 years ago
- ☆24Aug 17, 2017Updated 8 years ago
- 基于BurpCollector的二次开发, 记录Burpsuite Site Map记录的里的数据包中的目录路径参数名信息,并存入Sqlite,并可导出txt文件。☆24May 8, 2019Updated 6 years ago
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- Popular Ransomware file extensions☆27Jan 16, 2026Updated last month
- A extension for collecting parameters☆25Oct 25, 2020Updated 5 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- 利用递归,通过匹配网页源码里的子域内容收集所有的子域信息,可收集四级五级等多级子域名。☆32Apr 12, 2018Updated 7 years ago
- An easy & free way to collect sponsorships for your projects.☆11Mar 9, 2023Updated 2 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- Make XSS Great Again☆31Nov 29, 2019Updated 6 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Code for the Arduino-based BadUSB inspired from the legendary Rubber Ducky from Hak5☆11Feb 28, 2023Updated 3 years ago
- Deep learning-based audio spoofing attack detection experiments for speaker verification.☆14Apr 20, 2023Updated 2 years ago
- Infrared based vein finder.☆12Oct 9, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- Helper library to read out the current balance of canteen cards using NFC.☆12Oct 14, 2024Updated last year
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- This is a place for everything UK related☆10Feb 1, 2023Updated 3 years ago
- CNVD-C-2019-48814 Weblogic wls9_async_response 反序列化利用工具☆36Jun 3, 2019Updated 6 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- Linux Remote Access Trojan (RAT)☆40Oct 7, 2016Updated 9 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- Hardware and software for smartphone sensor peripherals using the audio jack interface.☆13Jan 10, 2014Updated 12 years ago
- ☆12Jan 18, 2016Updated 10 years ago