BusesCanFly / rpi-hunterLinks
Auto discover and exploit LAN raspberry pi's
☆108Updated last year
Alternatives and similar repositories for rpi-hunter
Users that are interested in rpi-hunter are comparing it to the libraries listed below
Sorting:
- An all-in-one briefcase for pentesting, OSINT and radio exploration☆82Updated 6 years ago
- Mobile UI for kismet☆182Updated last year
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 3 years ago
- Python port of infamous duckencoder for RubberDucky☆142Updated 2 years ago
- The pocket-sized wireless sniffer☆222Updated 4 years ago
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆70Updated 6 years ago
- Make a Raspberry Pi into a Anonymizing Tor Proxy!☆105Updated 11 years ago
- An nmap NSE script which is able to detect and enumerate (dump payloads and settings) of O.MG cables, connected to defender controlled ne…☆47Updated 5 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setup☆88Updated 3 years ago
- Attacks for $5 or less using Arduino☆81Updated 6 years ago
- WiFi Pineapple DIY☆79Updated 8 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆209Updated 6 years ago
- Simple Karma Attack☆69Updated 5 years ago
- Easily setup a hidden service inside the Tor network☆175Updated last year
- Operational Security utility and automator.☆140Updated 5 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆86Updated 7 years ago
- A simple tool to generate fake web browsing and mitigate tracking☆286Updated 10 months ago
- Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps an…☆52Updated 7 years ago
- A simple, handy network addressing multitool with plenty of features☆103Updated 5 years ago
- A Script to Convert Debian Linux into Kali Linux☆55Updated 6 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆72Updated 11 months ago
- Wordlists are generated by permutations of a list of keywords. You can configure (connectors, abbreviations, reverse, replacements ...) t…☆38Updated 6 years ago
- Airodump-ng WiFi Scan Visualizer