Create fake AP in Kali with 1 command
☆269Nov 25, 2015Updated 10 years ago
Alternatives and similar repositories for fakeAP
Users that are interested in fakeAP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- Continuously jam all wifi clients/routers☆4,227Jul 20, 2024Updated last year
- Find wifi channel with least interference☆54Jul 21, 2019Updated 6 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Multi-mode wireless LAN Based on a Software Access point for Kali Linux.☆54Sep 22, 2018Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Inject code and spy on wifi users☆2,618Jul 31, 2021Updated 4 years ago
- Prints the IPs on your local network that're sending the most packets☆155Jul 20, 2021Updated 4 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆257Nov 19, 2017Updated 8 years ago
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- Does some google dorks against a domain☆167Jan 20, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆285Sep 19, 2014Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Feb 18, 2015Updated 11 years ago
- Sniffs sensitive data from interface or pcap☆1,822Nov 2, 2023Updated 2 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Finds public elite anonymity proxies and concurrently tests them☆251Nov 23, 2016Updated 9 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- ARP ping detector on local network☆15Feb 3, 2013Updated 13 years ago
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Feb 26, 2018Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆13Aug 18, 2016Updated 9 years ago
- Fake wireless Access Point (AP) implementation using Python and Scapy, intended for convenient testing of 802.11 protocols and implementa…☆248Aug 6, 2015Updated 10 years ago
- darm - intelligent network sniffer for the masses darm is an attempt to create a very easy to use app that will sniff and report informa…☆30Jun 14, 2013Updated 12 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆69Sep 9, 2015Updated 10 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago