6e726d / PyWiWiLinks
Python Windows Wifi
☆41Updated 9 years ago
Alternatives and similar repositories for PyWiWi
Users that are interested in PyWiWi are comparing it to the libraries listed below
Sorting:
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Updated 3 years ago
- Various pentest scripts☆14Updated 11 years ago
- cross-platform sqlmap GUI aimed to mobile devices☆49Updated 9 years ago
- w3af packaging for Kali distribution☆26Updated 10 years ago
- My metasploit modules☆11Updated 10 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- runtime code injector for Linux☆26Updated 14 years ago
- A free open source python program to start WiFi hotspot in Windows without any external software☆27Updated 9 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Tiny WiFi sniffer with Scapy for MAC OS X☆22Updated 11 years ago
- ARP Poisoning Defense Scripts☆38Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- ☆16Updated 10 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Updated 11 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Updated 3 years ago
- Exploit Pack - One step ahead☆12Updated 12 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- ☆77Updated 6 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Network Guardian☆12Updated 8 years ago
- Proof of Concepts, Exploits☆28Updated 8 months ago
- Native Android software for dumping memory from Android processes☆14Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago