BusesCanFly / rpi-hunterLinks
Auto discover and exploit LAN raspberry pi's
β107Updated last year
Alternatives and similar repositories for rpi-hunter
Users that are interested in rpi-hunter are comparing it to the libraries listed below
Sorting:
- An all-in-one briefcase for pentesting, OSINT and radio explorationβ80Updated 6 years ago
- π Modular web based pentesting interface. Designed to run on Pi devices!β70Updated 6 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.ioβ162Updated 2 years ago
- Mobile UI for kismetβ180Updated 9 months ago
- "PRinter Exploitation Toolkit" LAN automation toolβ208Updated 5 years ago
- Attacks for $5 or less using Arduinoβ81Updated 5 years ago
- Make a Raspberry Pi into a Anonymizing Tor Proxy!β104Updated 11 years ago
- Python port of infamous duckencoder for RubberDuckyβ142Updated 2 years ago
- Operational Security utility and automator.β135Updated 4 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.β84Updated 7 years ago
- Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps anβ¦β49Updated 6 years ago
- A Script to Convert Debian Linux into Kali Linuxβ54Updated 6 years ago
- Tweaks to run Kali Linux desktop panels and gui apps on Windows 10β128Updated 2 years ago
- Airodump-ng WiFi Scan Visualizerβ60Updated 7 years ago
- The pocket-sized wireless snifferβ216Updated 3 years ago
- Simple Karma Attackβ69Updated 4 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setupβ87Updated 3 years ago
- Docker container for creating the phishing sites using Blackeyeβ145Updated 2 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β234Updated 4 years ago
- An nmap NSE script which is able to detect and enumerate (dump payloads and settings) of O.MG cables, connected to defender controlled neβ¦β48Updated 5 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to goβ205Updated 6 years ago
- Easily setup a hidden service inside the Tor networkβ175Updated last year
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β254Updated 6 years ago
- List of Awesome Offensive Tools written in GOβ202Updated 6 years ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rulesβ75Updated last month
- π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)β15Updated 6 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".β70Updated 8 months ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.β51Updated 4 years ago
- A simple tool to generate fake web browsing and mitigate trackingβ285Updated 7 months ago
- Tool made to automate tasks of pentesting.β169Updated 5 years ago