lscript
Chimera
Our great sponsors
lscript | Chimera | |
---|---|---|
2 | 3 | |
3,844 | 1,260 | |
- | - | |
0.0 | 0.0 | |
over 2 years ago | over 2 years ago | |
Shell | PowerShell | |
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
lscript
-
lazy script interface issue
I am using kali Linux with the terminal emulator. I'm in a vm as well and yes the black screen is on the terminal emulator it is just the lazy script from github https://github.com/arismelachroinos/lscript.git after you run ./install.sh you are told to enter your wlan0 and other addresses. I messed up and did not put in the right addresses and now am unable to get back to that screen
-
Is it possible to crack a WPS faster with more Wifi interface devices?
I had the fastest wps cracked with this tool, it is as ez as it could get https://github.com/arismelachroinos/lscript
Chimera
What are some alternatives?
airgeddon - This is a multi-use bash script for Linux systems to audit wireless networks.
ThreatCheck - Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
ImgBackdoor - Hide your payload into .jpg file
BetterXencrypt - A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
pwncat - pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
ConPtyShell - ConPtyShell - Fully Interactive Reverse Shell for Windows
Attiny85 - RubberDucky like payloads for DigiSpark Attiny85
pixload - Image Payload Creating/Injecting tools
wpa2-wordlists - A collection of wordlists dictionaries for password cracking
DefenderCheck - Identifies the bytes that Microsoft Defender flags on.
Horus-Eye - Just Simple Code To Play With Android Payloads (;
Create-Thread-Shellcode-Fetcher - This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.