☆16Apr 4, 2015Updated 10 years ago
Alternatives and similar repositories for wifiarsenal
Users that are interested in wifiarsenal are comparing it to the libraries listed below
Sorting:
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- A simple little Python script that uses Impacket to check if SMBv1 is enabled on a remote host☆16Mar 9, 2017Updated 9 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Information Gathering Tool☆24Aug 16, 2013Updated 12 years ago
- ☆30Dec 20, 2014Updated 11 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- Linux-only wrapper around wmi-client for WMI (Windows)☆27Apr 25, 2018Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 10 years ago
- Highly performant layer7 DoS tool☆14Sep 14, 2025Updated 5 months ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 4 months ago
- A way to share your Keybase profile online easily through an image implemented through PHP.☆10Feb 12, 2019Updated 7 years ago
- Mirror of KeyBase data☆10Jan 4, 2018Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- POC of sudo password stealer☆36Feb 10, 2021Updated 5 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Radar IQ data processing using the GPU☆10Nov 12, 2025Updated 3 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- This repository provides a Python package so everyone can easily try Computer Use of ClaudeAI.☆10Nov 1, 2024Updated last year
- Adapted OS for e-ink tablets - allows to use work-related apps with no harm for eyes☆11May 17, 2020Updated 5 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- 📱 Record iOS devices from command line☆15Jul 14, 2020Updated 5 years ago
- ☆43Jun 4, 2014Updated 11 years ago
- Discover, setup, and get stats on network interfaces☆11Nov 17, 2023Updated 2 years ago
- ☆20Feb 28, 2026Updated last week
- ☆13Aug 9, 2017Updated 8 years ago
- ☆11Sep 4, 2020Updated 5 years ago
- MagicMirror plug-in module that displays a table of MySQL SELECT results☆10Jan 5, 2026Updated 2 months ago
- ☆10Apr 18, 2019Updated 6 years ago
- DDOS SAMP☆12Apr 2, 2023Updated 2 years ago
- Clases de Implantación de Sistemas Operativos☆26Mar 3, 2026Updated last week