Fluxion is a remake of linset by vk496 with enhanced functionality.
☆5,692Apr 3, 2026Updated last month
Alternatives and similar repositories for fluxion
Users that are interested in fluxion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,724Updated this week
- The Rogue Access Point Framework☆14,584Feb 4, 2025Updated last year
- Rewrite of the popular wireless network auditor, "wifite"☆7,816Aug 20, 2024Updated last year
- Powerful framework for rogue access point attack.☆2,452Jan 9, 2024Updated 2 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,210Mar 17, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Efficient and advanced man in the middle framework☆2,181Mar 23, 2023Updated 3 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,155Apr 18, 2020Updated 6 years ago
- The LAZY script will make your life easier, and of course faster.☆4,321Aug 28, 2021Updated 4 years ago
- Exploitation Framework for Embedded Devices☆13,105May 5, 2026Updated last week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,172Apr 18, 2026Updated 3 weeks ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,375May 5, 2026Updated last week
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,482Sep 22, 2024Updated last year
- Small tool to capture packets from wlan devices.☆2,128Apr 6, 2026Updated last month
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆2,529Aug 26, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Attack Surface Management Platform☆9,727Apr 29, 2026Updated last week
- The famous WPA precomputed cracker, Migrated from Google.☆1,126Jun 15, 2024Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆4,219Oct 9, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,062Oct 6, 2025Updated 7 months ago
- Framework for Man-In-The-Middle attacks☆3,639Aug 28, 2018Updated 7 years ago
- Phishing Tool & Information Collector☆4,723Oct 29, 2024Updated last year
- ☆1,937Oct 31, 2025Updated 6 months ago
- Evil Twin Attack Bash script☆574Feb 21, 2016Updated 10 years ago
- WiFi security auditing tools suite☆7,215Jul 28, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Accurately Locate Smartphones using Social Engineering☆9,407May 7, 2025Updated last year
- A swiss army knife for pentesting networks☆9,126Dec 6, 2023Updated 2 years ago
- An offline Wi-Fi Protected Setup brute-force utility☆1,700Apr 17, 2026Updated 3 weeks ago
- MDK4☆765Aug 16, 2024Updated last year
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,266Dec 18, 2021Updated 4 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,972Mar 22, 2024Updated 2 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,835Jan 19, 2020Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,819Updated this week
- Common User Passwords Profiler (CUPP)☆5,909Dec 26, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automated Mass Exploiter☆5,239May 22, 2023Updated 2 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆877Dec 28, 2018Updated 7 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,665Jun 20, 2024Updated last year
- Credentials recovery project☆10,807Sep 18, 2025Updated 7 months ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,255Oct 4, 2023Updated 2 years ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆12,028Aug 8, 2024Updated last year
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,082Jan 15, 2021Updated 5 years ago