Pidense🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Stars: ✭ 358 (-96.67%)
WirespyFramework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Stars: ✭ 293 (-97.27%)
ProbequestToolkit for Playing with Wi-Fi Probe Requests
Stars: ✭ 167 (-98.44%)
Wifi PassviewAn open source batch script based WiFi Passview for Windows!
Stars: ✭ 157 (-98.54%)
Kickthemout💤 Kick devices off your network by performing an ARP Spoof attack.
Stars: ✭ 2,005 (-81.32%)
CatchmeCatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-99.74%)
wifi-deautherA fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-99.77%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (-85.78%)
Wifi Pumpkin DeprecatedDEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3
Stars: ✭ 2,964 (-72.39%)
Pi Pwnbox RogueapHomemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Stars: ✭ 798 (-92.57%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-99.77%)
BettercapDEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap
Stars: ✭ 2,518 (-76.54%)
Auto-Besside-CapturerCapture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.
Stars: ✭ 28 (-99.74%)
mitmA simple yet effective python3 script to perform DNS spoofing via ARP poisoning
Stars: ✭ 23 (-99.79%)
RedTeamOne line PS scripts that may come handy during your network assesment
Stars: ✭ 56 (-99.48%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-99.55%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-97.5%)
HettyHetty is an HTTP toolkit for security research.
Stars: ✭ 3,596 (-66.5%)
Esp AtAT application for ESP32 ESP-IDF & ESP32S2 ESP-IDF & ESP8266 ESP8266_RTOS_SDK
Stars: ✭ 319 (-97.03%)
AirgeddonThis is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (-64.32%)
KatanaA Python Tool For google Hacking
Stars: ✭ 355 (-96.69%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-96.44%)
ProxyThe Istio proxy components.
Stars: ✭ 533 (-95.03%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-96.94%)
Esp32 mouse keyboardESP32 implementation for HID over GATT Keyboard and Mouse (Bluetooth Low Energy). Including serial API for external modules (similar to Adafruit EZKey HID)
Stars: ✭ 420 (-96.09%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+206.56%)
Ssh MitmSSH man-in-the-middle tool
Stars: ✭ 1,328 (-87.63%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-99.66%)
owtUpdate Version 3.1 added free SMS messaging.
Stars: ✭ 339 (-96.84%)
AggressorScriptsA collection of Cobalt Strike aggressor scripts
Stars: ✭ 18 (-99.83%)
whos-on-my-networkKeep an eye on who and when something is connected to your network
Stars: ✭ 54 (-99.5%)
Proxy ListGet PROXY List that gets updated everyday
Stars: ✭ 347 (-96.77%)
MastermindMan in the middle testing
Stars: ✭ 341 (-96.82%)
Ssh Mitmssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation
Stars: ✭ 335 (-96.88%)
Betwixt⚡ Web Debugging Proxy based on Chrome DevTools Network panel.
Stars: ✭ 4,316 (-59.8%)
Create ap[NOT MAINTAINED] This script creates a NATed or Bridged WiFi Access Point.
Stars: ✭ 4,142 (-61.42%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (-44.64%)
Blinker PyBlinker python library for hardware. Works with Raspberry Pi, Banan Pi, Linux devices
Stars: ✭ 680 (-93.67%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-93.25%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-93.69%)
BoopsuiteA Suite of Tools written in Python for wireless auditing and security testing.
Stars: ✭ 807 (-92.48%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (-91.5%)
HcxdumptoolSmall tool to capture packets from wlan devices.
Stars: ✭ 945 (-91.2%)
Awesome Network StuffResources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.
Stars: ✭ 578 (-94.62%)
Pythempentest framework
Stars: ✭ 1,060 (-90.13%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (-16.34%)
Project TauroA Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-99.52%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (-88.93%)
ProxifySwiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
Stars: ✭ 1,153 (-89.26%)
VenomVenom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (-88.56%)
Redteam vul红队作战中比较常遇到的一些重点系统漏洞整理。
Stars: ✭ 1,271 (-88.16%)
Blinker LibraryAn IoT Solution,Blinker library for embedded hardware. Works with Arduino, ESP8266, ESP32.
Stars: ✭ 1,095 (-89.8%)
Ble Security Attack Defence✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-99.18%)