LionSec / wifrestiLinks
Find your wireless network password in Windows , Linux and Mac OS
☆354Updated 4 years ago
Alternatives and similar repositories for wifresti
Users that are interested in wifresti are comparing it to the libraries listed below
Sorting:
- Linux bash script automation for metasploit☆267Updated 6 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆374Updated 8 years ago
- Some usefull scripts for KaliLinux☆472Updated 3 years ago
- Git all your favorite tools in one click☆269Updated 3 years ago
- Evil Twin Attack Bash script☆567Updated 9 years ago
- WPS hacking scripts☆282Updated last year
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆438Updated 7 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆290Updated 8 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆380Updated 5 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆440Updated 8 years ago
- A Phishing Dropper designed to Pentest.☆274Updated 8 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆303Updated 3 years ago
- The Credential Mapper☆447Updated 7 years ago
- Detect, capture, crack WPA/2 handshakes, WEP Keys and geotag with Android GPS☆192Updated 10 years ago
- Inject malicious code into *.debs☆276Updated 3 years ago
- information gathering via dorks☆391Updated 3 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆254Updated 7 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆526Updated 8 years ago
- Social engineering tool for human hacking☆122Updated 8 years ago
- Advanced Hash Manipulation☆176Updated 6 years ago
- The Hacker's ToolBox☆189Updated 8 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆226Updated 4 years ago
- SpeedPhishing Framework☆448Updated 6 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆314Updated 3 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- A unified console to perform the "kill chain" stages of attacks.☆206Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆337Updated last year
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆257Updated 4 years ago
- Maltego Penetration Testing Transforms☆374Updated 6 years ago