WiFi-Pumpkin, Active Rogue AP for MITM interception, Kismet, Wireless sniffing + mapping networks., SET (Social Engineering Toolkit), Automate phishing, payloads, clones, SMS attacks.Active Automate phishing/SE payloads, Gophish, Active Manage phishing campaigns., Evilginx, Proxy phishing to steal session tokens (2FA bypass)., BeEF, Browser exploitation framework., Scapy, Active Craft/customize packets for fuzzing/manipulation., tcpreplay, Active Replay captured network traffic., MobSF, Passive Mobile app static/dynamic analysis., Frida, Runtime instrumentation of mobile apps. “Mess with apps while they’re running.”, Drozer, Active Android app/OS exploitation, ADB, Control debug, Android device, install apps, pull data., Bluestirke/Bluestrike, Bluetooth attack toolkit., Cain & Abel, “Old school Windows password + sniffing tool.”, Ettercap, LAN MITM attacks (ARP poisoning)., Airgeddon, Wireless auditing & cracking suite. , Exploit-DB / searchsploit, Search for exploits locally or online., Hping3, Packet crafting + DoS testing..
0%
Attacks & Exploits #2
Share
Share
Share
by
Pookiedookie
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
)
Open results
Copy link
QR code
Delete
Continue editing:
?