Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
☆566Jul 26, 2025Updated 8 months ago
Alternatives and similar repositories for WiFi-password-stealer
Users that are interested in WiFi-password-stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PacketSpy☆157May 31, 2024Updated last year
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆177Feb 29, 2024Updated 2 years ago
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆169Jan 2, 2026Updated 2 months ago
- Dark-Shell is a Tool for Generating ReverShell File☆115Oct 30, 2025Updated 4 months ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- ☆152Jun 8, 2025Updated 9 months ago
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- A tool that automates MAC address and hostname spoofing☆61Sep 6, 2019Updated 6 years ago
- 👀Sagemode: Track and Unveil Online identities across social media platforms🕵️♂️☆276Dec 21, 2023Updated 2 years ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆110Sep 7, 2023Updated 2 years ago
- OSINT tool to crawl a site and extract useful recon info.☆460Aug 13, 2025Updated 7 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆407Jun 19, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.☆1,095Mar 7, 2025Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- Light-weight web security scanner☆149Nov 22, 2025Updated 4 months ago
- ☆568Mar 28, 2024Updated 2 years ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,316Updated this week
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆485Apr 17, 2025Updated 11 months ago
- Docker Remote API Scanner and Exploit☆179Nov 13, 2023Updated 2 years ago
- Block any extension or website from accessing network☆43Sep 25, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆790Jan 9, 2025Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆391Jan 20, 2026Updated 2 months ago
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆222Mar 26, 2025Updated last year
- ☆22Jul 15, 2023Updated 2 years ago
- NetProbe: Network Probe☆172Oct 13, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- hauditor is a tool designed to analyze the security headers returned by a web page.☆177Jul 6, 2024Updated last year
- Rubber Ducky powered by NeoKey☆29Jun 3, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆378Dec 5, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆145May 17, 2024Updated last year