Wednesday, January 16, 2019
Home Reaver + PixieWPS – Tool to Bruteforce the WPS of a WiFi Router reaver2

reaver2

reaver

Reaver Initial Setup

reaver
reaver

Must Need

CTF

CTF – Some Setup Scripts For Security Research Tools

CTF is a collection of setup scripts to create an install of various security research tools. Of course, this isn't a hard problem, but...
Phishing Frenzy

Phishing Frenzy – Ruby on Rails Phishing Framework

Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns. The goal of the...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...

PasteJacker : Hacking Systems With The Automation Of PasteJacking Attacks

PasteJacker the main purpose of the tool is automating (PasteJacking/Clipboard poisoning/whatever you name it) attack with collecting all the known tricks used in this...
Hcxdumptool

Hcxdumptool – Small Tool To Capture Packets From WLAN Devices

Hcxdumptool is small tool to capture packets from wlan devices. After capturing, upload the "uncleaned" cap here to see if your application or the...
Remove term: WiFi-Pumpkin WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is a complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In...

WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques

WinPwnage meaning is to study the techniques. Techniques are found online, on different blogs and repos here on GitHub. I do not take credit...