JavaRockstar / Collection-of-Extra-Phishing-Scenarios-Wifiphisher
Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not be legal in your country to use these scripts please read disclaimer before attempting to download any content from this page. Be responsible with these scenarios !. They are intended to be tested on your own n…
☆12Updated 7 years ago
Related projects: ⓘ
- hackpack to go with lazykali on menu application Kali Linux☆26Updated 9 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆44Updated 6 months ago
- Basic python script for detect airdroid users in lan☆46Updated 3 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Updated 5 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- wifi attacks suite☆59Updated 3 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- Unified repository for different Metasploit Framework payloads☆13Updated 7 years ago
- ☆42Updated this week
- 802.11 Exploitation Tool for use with Kali 2. More tools available than WHAT or WHAT Pi☆14Updated 8 years ago
- Simple security surveillance script for linux distributions.☆56Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- ☆16Updated this week
- Script that easily creates, signs and AV bypass .apk metasploit reverse_tcp payload.☆18Updated 4 years ago
- ☆23Updated this week
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 7 years ago
- Juice Jacking / Automatic Android Rooting based on Intel Edison using dirty c0w☆12Updated 7 years ago
- An automated Python script which installs an extra arsenal of penetration testing tools and utilities into Kali Linux.☆29Updated 7 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 5 years ago
- ☆17Updated this week
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆29Updated 11 years ago
- ☆23Updated this week
- Massive arsenal of hacker tools...☆75Updated 6 years ago
- Vault 7: CIA Hacking Tools Revealed☆15Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆29Updated 8 years ago
- ☆22Updated this week
- to grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network pas…☆48Updated 6 years ago
- This is a collection of scripts to add to kali linux☆17Updated 6 years ago
- ☆26Updated this week
- A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.☆48Updated 8 years ago