Debajyoti0-0 / AirHuntView external linksLinks
AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wide range of powerful features, AirHunt empowers users to conduct comprehensive wireless network security assessments.
☆67Jul 25, 2023Updated 2 years ago
Alternatives and similar repositories for AirHunt
Users that are interested in AirHunt are comparing it to the libraries listed below
Sorting:
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- bugreport☆13May 19, 2019Updated 6 years ago
- Posion: es un script capaz de escanear hosts, MAC spoofing, realizar ataque de SYNflood y sniffear FTP.☆12Jun 23, 2022Updated 3 years ago
- A tool to automatically redirect all traffic through the TOR and change the IP every 0 to x seconds. And provides a custom MAC address. <…☆100Jan 13, 2026Updated last month
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- ☆19Nov 28, 2024Updated last year
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆271Nov 25, 2023Updated 2 years ago
- light weight dos attack tool to attack to a single port to any network.☆31May 30, 2023Updated 2 years ago
- BlackVenom is a personal project designed for ethical ARP and DNS spoofing 🛡️. It helps cybersecurity professionals practice network tra…☆23Jun 21, 2025Updated 7 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated last year
- A Linux shell tool that has multiple tools such as, Instagram Scraper, Phisher, Network Scanner, Port Scanner, Packet Sniffer, Web Scrape…☆24Jan 31, 2023Updated 3 years ago
- Remote Email Keylogger☆14Jun 2, 2022Updated 3 years ago
- AI-Powered CyberSecurity Compliance: Boost Network Security with OpenAI GPT-3.5-turbo☆10May 18, 2023Updated 2 years ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆35Updated this week
- ☆13Jun 29, 2023Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Jun 10, 2024Updated last year
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 9 months ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 6 months ago
- This is a multipurpose tool which is useful in networking or network hacking.☆84Apr 15, 2023Updated 2 years ago
- Rogue access point tool.☆57Jun 22, 2022Updated 3 years ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆30Jul 17, 2024Updated last year
- Automated Wireless Attack Framework☆74Mar 18, 2019Updated 6 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- Bug Bounty ultimate tool☆29Dec 3, 2025Updated 2 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Aug 12, 2020Updated 5 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Jun 11, 2024Updated last year
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆12Dec 27, 2018Updated 7 years ago
- Automated enumeration for red teamers☆10Nov 22, 2022Updated 3 years ago
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Jun 25, 2022Updated 3 years ago
- ☆17Jun 24, 2021Updated 4 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆65Jul 18, 2024Updated last year
- linux based ransomware builder tool that can create a fully offline windows ransomware executable.☆31Jan 10, 2026Updated last month
- A Powerful DDoS Tool For making Any Service DOWN, Also Included Proxies and Socks for Anonymization☆55May 25, 2023Updated 2 years ago
- Document Dropper w/ integrated c2☆27Oct 23, 2025Updated 3 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆14Aug 22, 2024Updated last year