Find your wireless network password in Windows , Linux and Mac OS
☆371Nov 5, 2020Updated 5 years ago
Alternatives and similar repositories for wifresti
Users that are interested in wifresti are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Efficient and advanced man in the middle framework☆2,180Mar 23, 2023Updated 3 years ago
- Automatically install all Kali linux tools☆5,223Apr 29, 2024Updated last year
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆452Jan 31, 2018Updated 8 years ago
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆380Apr 13, 2017Updated 8 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 4 months ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Github information gathering☆25Jul 19, 2021Updated 4 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,156Apr 18, 2020Updated 5 years ago
- wireless hacking - This is automated wireless hacking tool☆1,282Oct 27, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A tool to list plugins installed on a wordpress powered website.☆11Jun 20, 2024Updated last year
- a MITM attack tool☆85Sep 9, 2015Updated 10 years ago
- Network Attack Tool☆1,497May 1, 2023Updated 2 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Quick scan to find live hosts on the network/across networks☆48Jul 4, 2014Updated 11 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Undetectable Windows Payload Generation☆1,610Nov 8, 2022Updated 3 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,266Dec 18, 2021Updated 4 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A unified console to perform the "kill chain" stages of attacks.☆206Jul 15, 2023Updated 2 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆109Apr 13, 2016Updated 9 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Feb 20, 2023Updated 3 years ago
- A simple python script to scan and attack wireless networks.☆208May 3, 2017Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- A Phishing Dropper designed to Pentest.☆274May 15, 2017Updated 8 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆257Nov 19, 2017Updated 8 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- RWMC is no longer supported. Please use PowerMemory.☆164Feb 13, 2016Updated 10 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆249Nov 11, 2020Updated 5 years ago
- Social Engineering Tool Oriented to facebook☆58Apr 7, 2017Updated 9 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,350Nov 16, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆644Feb 9, 2022Updated 4 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago