A Python and ruby script to automate rogue AP process
☆50May 2, 2024Updated last year
Alternatives and similar repositories for hostbase
Users that are interested in hostbase are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Détecteur box vulnérables à la brèche PIN NULL☆13Sep 15, 2017Updated 8 years ago
- Obtain handshakes from networks out of your range!☆28Sep 20, 2021Updated 4 years ago
- Ataque EVIL TWIN☆54Aug 20, 2017Updated 8 years ago
- monitor mode wpa/wpa2 password bruteforcer☆17Nov 1, 2019Updated 6 years ago
- VMR-MDK is a script/tool for hacking wps wireless networks☆58May 23, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- documents and specifications☆35Jun 29, 2018Updated 7 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- WiFi deauthentication attack using Scapy☆13Jan 21, 2018Updated 8 years ago
- Improved version of pintool☆17Jul 24, 2016Updated 9 years ago
- Effectively search the Exploit-DB☆15Apr 16, 2020Updated 5 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆12Dec 19, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Rockcast HDMI Teardown☆12Jul 2, 2018Updated 7 years ago
- This repository contains some bettercap transparent proxy example modules.☆16Nov 28, 2017Updated 8 years ago
- ☆1,930Oct 31, 2025Updated 5 months ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- ☆18Dec 23, 2024Updated last year
- parkrunPortable; stopwatch & barcode downloading software - runs on Kingston MLWG2 portable router☆13May 21, 2020Updated 5 years ago
- A list of wireless cards tested with the dual-card injection test and in the field☆27Oct 21, 2018Updated 7 years ago
- ☆43Oct 15, 2019Updated 6 years ago
- MacGeiger - a tool to track down the location of WIFI APs with sound (Geigercounter-like)☆59Apr 16, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Simple mods to wpa_supplicant to allow more efficient online bruting☆20Aug 23, 2019Updated 6 years ago
- some scripts to get imsi with gsm☆16Aug 23, 2016Updated 9 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆32Apr 8, 2019Updated 7 years ago
- Resources for increasing power of ath9k devices, such as TP-link WN722N☆17Jun 5, 2015Updated 10 years ago
- scrapin' proxies with ocr☆19Jun 19, 2018Updated 7 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆79Aug 18, 2018Updated 7 years ago
- Ghidra plugin for HashDB☆21Oct 11, 2023Updated 2 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Opencore EFI for T450s and X1 Carbon 3rd Gen. Tested with Monterey☆11Oct 21, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Drivers for the rtl8192eu chipset for wireless adapters (D-Link DWA-131 rev E1 included!)☆24Dec 3, 2023Updated 2 years ago
- 🔍 A tool for sniffing unencrypted wireless probe requests from devices.☆340Nov 3, 2019Updated 6 years ago
- ☆19Feb 21, 2015Updated 11 years ago
- ☆575Oct 10, 2023Updated 2 years ago
- WiFi Evil Twin Attack - Credential Harvest Tool☆16Dec 2, 2025Updated 4 months ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 3 months ago
- WPS Locked Intrusion Script for Kali Linux 2.0 and 2016☆40Jan 12, 2018Updated 8 years ago