A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
☆342Aug 1, 2024Updated last year
Alternatives and similar repositories for EvilTwinFramework
Users that are interested in EvilTwinFramework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆652Oct 15, 2022Updated 3 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- A semi-automatic osint/recon framework.☆25May 22, 2024Updated last year
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 3 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 10 months ago
- DDos and Evil Twin Combo☆48Nov 12, 2021Updated 4 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- ESP8266-Evil Twin with deauth capability☆446Oct 20, 2021Updated 4 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,480Sep 22, 2024Updated last year
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,078Jan 15, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Fake-AP to perform Evil Twin Attack☆67Jul 29, 2018Updated 7 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- This is a wifi Brute Force. script undetectable and secure!☆389Oct 4, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Powerful framework for rogue access point attack.☆2,418Jan 9, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Wifiphisher wifi connect template modified for Wifi Pineapple evilportal module☆11Feb 7, 2017Updated 9 years ago
- Scripts to parse large Android binary images and extracts deleted data from apps☆15May 19, 2017Updated 8 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Nov 15, 2020Updated 5 years ago
- Fast exploitation based on metasploit.☆74Dec 28, 2019Updated 6 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Automated WPA/WPA2 PSK attack tool.☆632Aug 21, 2021Updated 4 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆57Sep 22, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- Run interactive android exploits in linux.☆149Feb 11, 2025Updated last year
- Boscloner - All in One RFID Cloning Toolkit☆17Apr 14, 2017Updated 9 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- ☆719Sep 10, 2024Updated last year
- Simple mods to wpa_supplicant to allow more efficient online bruting☆20Aug 23, 2019Updated 6 years ago