Esser50K / EvilTwinFrameworkLinks
A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
☆321Updated last year
Alternatives and similar repositories for EvilTwinFramework
Users that are interested in EvilTwinFramework are comparing it to the libraries listed below
Sorting:
- Community-built scenarios for Wifiphisher☆369Updated 4 years ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆638Updated 3 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆270Updated 7 years ago
- Wireless Jammer to Disconnect Nearby Access-Points and Stations.☆210Updated 4 years ago
- PowerFull Administration Tool For Linux☆187Updated 8 years ago
- Bluetooth hacking tools☆454Updated 2 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆161Updated last year
- Websploit is an advanced MITM framework.☆301Updated 7 years ago
- Automated WPA/WPA2 PSK attack tool.☆587Updated 4 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆380Updated 5 years ago
- This shows how to install pyrit for fluxion or other wifi hacking tools if you don't have pip installed or you have☆177Updated 2 months ago
- Exploitation Framework for ATtiny85 Based HID Attacks☆356Updated 5 years ago
- Hacking systems with the automation of PasteJacking attacks.☆401Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆430Updated 3 years ago
- Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/☆240Updated last year
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆259Updated 6 years ago
- A statistically optimized USB rubber ducky payload to brute force 4-digit Android PINs.☆207Updated 10 years ago
- Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.☆145Updated last year
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆551Updated 5 years ago
- Multiplatform payload dropper☆276Updated 4 years ago
- Enhanced functions and new features for airgeddon!☆110Updated last year
- This program capture SMS & IMSI numbers of cellphones around you.☆247Updated 3 years ago
- Bluetooth Honeypot☆261Updated 4 years ago
- PhishX - The Complete Spear Phishing Tool☆108Updated 7 years ago
- Manipulate Chromecast Devices in your Network☆248Updated 5 years ago
- Automatically hacking usb stick (gets passwords + keylogger)☆241Updated 6 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆438Updated 7 years ago
- A simple script to generate a hidden url for social engineering.☆121Updated 5 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆755Updated 5 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,044Updated 4 years ago