DanMcInerney / wifijammerLinks
Continuously jam all wifi clients/routers
☆4,088Updated 10 months ago
Alternatives and similar repositories for wifijammer
Users that are interested in wifijammer are comparing it to the libraries listed below
Sorting:
- Inject code and spy on wifi users☆2,600Updated 3 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,673Updated 5 years ago
- ☆3,449Updated 2 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,122Updated 5 years ago
- wireless hacking - This is automated wireless hacking tool☆1,255Updated 2 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,227Updated 3 years ago
- An offline Wi-Fi Protected Setup brute-force utility☆1,618Updated 2 years ago
- Network Attack Tool☆1,469Updated 2 years ago
- Framework for Man-In-The-Middle attacks☆3,613Updated 6 years ago
- The Rogue Access Point Framework☆13,864Updated 3 months ago
- The famous WPA precomputed cracker, Migrated from Google.☆1,095Updated 11 months ago
- 💤 Kick devices off your network by performing an ARP Spoof attack.☆2,598Updated 2 years ago
- ☆1,815Updated 5 months ago
- WiFi arsenal☆2,014Updated 4 years ago
- Sniffs sensitive data from interface or pcap☆1,753Updated last year
- ☆3,409Updated 5 months ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,013Updated 4 years ago
- Efficient and advanced man in the middle framework☆2,102Updated 2 years ago
- Small tool to capture packets from wlan devices.☆1,964Updated 3 weeks ago
- Rewrite of the popular wireless network auditor, "wifite"☆6,949Updated 9 months ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,171Updated last month
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,094Updated 6 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,317Updated 8 months ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆584Updated 3 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,168Updated 5 years ago
- Exploitation Framework for Embedded Devices☆12,556Updated last month
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,118Updated 5 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,706Updated last year
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,502Updated 7 years ago
- Automatically brute force all services running on a target.☆2,088Updated 9 months ago