Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
☆568Jul 26, 2025Updated 8 months ago
Alternatives and similar repositories for WiFi-password-stealer
Users that are interested in WiFi-password-stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PacketSpy☆157May 31, 2024Updated last year
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆178Feb 29, 2024Updated 2 years ago
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆171Jan 2, 2026Updated 3 months ago
- Dark-Shell is a Tool for Generating ReverShell File☆115Oct 30, 2025Updated 5 months ago
- A small executable to trick a user to authenticate using code matching MFA☆67Oct 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- ☆153Jun 8, 2025Updated 10 months ago
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- A tool that automates MAC address and hostname spoofing☆61Sep 6, 2019Updated 6 years ago
- 👀Sagemode: Track and Unveil Online identities across social media platforms🕵️♂️☆277Dec 21, 2023Updated 2 years ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆110Sep 7, 2023Updated 2 years ago
- OSINT tool to crawl a site and extract useful recon info.☆461Aug 13, 2025Updated 8 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆411Jun 19, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.☆1,096Mar 7, 2025Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- Light-weight web security scanner☆149Nov 22, 2025Updated 4 months ago
- ☆570Mar 28, 2024Updated 2 years ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,327Updated this week
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆485Apr 17, 2025Updated last year
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- Block any extension or website from accessing network☆43Sep 25, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆791Jan 9, 2025Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆397Jan 20, 2026Updated 2 months ago
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆222Mar 26, 2025Updated last year
- hauditor is a tool designed to analyze the security headers returned by a web page.☆178Jul 6, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- NetProbe: Network Probe☆175Oct 13, 2024Updated last year
- Rubber Ducky powered by NeoKey☆29Jun 3, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Dec 5, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆146May 17, 2024Updated last year