A Python and ruby script to automate rogue AP process
☆50May 2, 2024Updated last year
Alternatives and similar repositories for hostbase
Users that are interested in hostbase are comparing it to the libraries listed below
Sorting:
- Ataque EVIL TWIN☆53Aug 20, 2017Updated 8 years ago
- VMR-MDK is a script/tool for hacking wps wireless networks☆58May 23, 2019Updated 6 years ago
- Ataque WPS transparente con rogue AP☆24Aug 8, 2024Updated last year
- Auto Reaver - multiple access point attack using Reaver☆52Feb 1, 2017Updated 9 years ago
- Interactive python script for exploiting WPS on access points. Works well with Kali 2.0. (Disclaimer: I'm not responsible for any illeg…☆10Sep 25, 2016Updated 9 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Obtain handshakes from networks out of your range!☆27Sep 20, 2021Updated 4 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- A way to force your wifi-pineapple to use SSL☆14Jul 26, 2017Updated 8 years ago
- Official repository for the Automatic Tinder Tutorial☆13Jun 16, 2020Updated 5 years ago
- WiFi deauthentication attack using Scapy☆13Jan 21, 2018Updated 8 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆12Dec 19, 2016Updated 9 years ago
- Ghidra plugin for HashDB☆21Oct 11, 2023Updated 2 years ago
- Scripts and guides to modify WiFi chip txpower and emit mock probe request at different txpower levels☆16Nov 7, 2022Updated 3 years ago
- This repository contains some bettercap transparent proxy example modules.☆16Nov 28, 2017Updated 8 years ago
- Tool for dictionary attack with fail2ban bypass.☆16Jan 8, 2022Updated 4 years ago
- ☆18Dec 23, 2024Updated last year
- Improved version of pintool☆17Jul 24, 2016Updated 9 years ago
- scrapin' proxies with ocr☆19Jun 19, 2018Updated 7 years ago
- documents and specifications☆35Jun 29, 2018Updated 7 years ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆16Apr 26, 2022Updated 3 years ago
- Resources for increasing power of ath9k devices, such as TP-link WN722N☆17Jun 5, 2015Updated 10 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- Return domains in CSP headers in http response☆16Aug 17, 2021Updated 4 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- monitor mode wpa/wpa2 password bruteforcer☆17Nov 1, 2019Updated 6 years ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆64Jan 19, 2026Updated last month
- Brute force attack detection with exponential-decay pressure scoring, 42 service rules, 8 firewall backends, IPv4/IPv6, and repeat-offend…☆26Updated this week
- CVE-2025-49144 PoC for security researchers to test and try.☆86Jun 30, 2025Updated 8 months ago
- ☆19Feb 21, 2015Updated 11 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Drivers for the rtl8192eu chipset for wireless adapters (D-Link DWA-131 rev E1 included!)☆24Dec 3, 2023Updated 2 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Nov 11, 2019Updated 6 years ago
- WiFi pineapple API Wrapper written in python☆23Sep 24, 2018Updated 7 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year