DanMcInerney / fakeAPLinks
Create fake AP in Kali with 1 command
☆269Updated 9 years ago
Alternatives and similar repositories for fakeAP
Users that are interested in fakeAP are comparing it to the libraries listed below
Sorting:
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- Metasploit AV Evasion Tool☆260Updated 9 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆136Updated 9 years ago
- SSLStrip version to defeat HSTS☆319Updated 7 years ago
- This repository contains some bettercap transparent proxy example modules.☆283Updated 7 years ago
- ☆283Updated 10 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆344Updated 8 years ago
- Unofficial Kali Documentation Project☆162Updated 10 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆366Updated 8 years ago
- BlackNurse attack PoC☆173Updated 8 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆494Updated 3 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆585Updated 3 years ago
- A Simple ARP Spoofer using Scapy☆104Updated 9 years ago
- Python network tool, similar to Netcat with custom features.☆194Updated 8 years ago
- ☆135Updated 9 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆180Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- SpiderLabs shared Nmap Tools☆229Updated 4 years ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆314Updated 6 years ago
- CookieCatcher☆143Updated 11 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 6 years ago
- BadUSB 2.0 USB-HID MiTM POC☆284Updated 9 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆260Updated 7 years ago
- [unmaintained] Post-exploitation tool☆183Updated 9 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,095Updated 6 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆227Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Updated 8 years ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- A JBoss script for obtaining remote shell access☆173Updated 4 years ago