Esser50K / EvilTwinFrameworkLinks
A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
☆327Updated last year
Alternatives and similar repositories for EvilTwinFramework
Users that are interested in EvilTwinFramework are comparing it to the libraries listed below
Sorting:
- Community-built scenarios for Wifiphisher☆373Updated 4 years ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆645Updated 3 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆276Updated 7 years ago
- Wireless Jammer to Disconnect Nearby Access-Points and Stations.☆210Updated 4 years ago
- PowerFull Administration Tool For Linux☆188Updated 8 years ago
- Bluetooth hacking tools☆460Updated 2 years ago
- Exploitation Framework for ATtiny85 Based HID Attacks☆356Updated 5 years ago
- Automated WPA/WPA2 PSK attack tool.☆610Updated 4 years ago
- Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/☆241Updated last year
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆164Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆431Updated 3 years ago
- Hacking systems with the automation of PasteJacking attacks.☆400Updated last year
- Websploit is an advanced MITM framework.☆303Updated 8 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆386Updated 5 years ago
- Multiplatform payload dropper☆276Updated 4 years ago
- This shows how to install pyrit for fluxion or other wifi hacking tools if you don't have pip installed or you have☆178Updated 4 months ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆439Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆762Updated 5 years ago
- Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.☆147Updated last year
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,053Updated 4 years ago
- A statistically optimized USB rubber ducky payload to brute force 4-digit Android PINs.☆208Updated 10 years ago
- Bluetooth Honeypot☆262Updated 4 years ago
- A simple script to generate a hidden url for social engineering.☆121Updated 5 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆261Updated 7 years ago
- Fake-AP to perform Evil Twin Attack☆67Updated 7 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆553Updated 5 years ago
- Automatically hacking usb stick (gets passwords + keylogger)☆241Updated 6 years ago
- A Phishing Dropper designed to Pentest.☆274Updated 8 years ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆190Updated 6 years ago
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆318Updated last year