yadox666 / WiFi_shellLinks
PoC presentada en CyberCamp 2018 para crear una shell mediante tramas 802.11
☆23Updated 7 years ago
Alternatives and similar repositories for WiFi_shell
Users that are interested in WiFi_shell are comparing it to the libraries listed below
Sorting:
- Automate Metasploit scanning and exploitation☆117Updated 6 months ago
- Using IPv6 to Bypass Security☆92Updated 5 months ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- A simple python reverse shell written just for fun.☆62Updated 3 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆94Updated 6 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 4 years ago
- NmapPy - Python implementation of Nmap☆35Updated 7 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Updated 7 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Updated 4 years ago
- A simple XSS finding tool☆110Updated 7 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Updated 6 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- A web application for generating custom XSS payloads☆77Updated 6 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 7 years ago
- Brute forcer and shell deployer for WildFly☆101Updated 7 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆44Updated 5 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Web Recon & Exploitation Tool.☆54Updated 5 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆111Updated 7 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Updated 5 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Updated 8 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 3 years ago
- Web application backdoor builder☆76Updated 4 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Updated 6 years ago
- Shodanwave - Netwave IP Camera☆18Updated 8 years ago
- ☆59Updated 8 years ago