MS-WEB-BN / c41nLinks
Automated rogue access point setup tool.
☆200Updated 4 years ago
Alternatives and similar repositories for c41n
Users that are interested in c41n are comparing it to the libraries listed below
Sorting:
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆244Updated last year
- Customized Password/Passphrase List inputting Target Info☆97Updated last year
- This Script Will Detect Canary Token in Microsoft Word Documents☆56Updated 5 years ago
- An Encrypted File transfer via AES-256-CBC☆52Updated 4 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆142Updated 5 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆136Updated 2 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆118Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Updated 2 weeks ago
- Full Valid Fake Data Generator☆101Updated last year
- ☆19Updated 7 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Updated 9 months ago
- Web Application Vulnerability Scanner☆128Updated 5 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆118Updated 2 years ago
- Web Service write in Python for control and protect your android device remotely.☆192Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆168Updated 3 weeks ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Updated 2 years ago
- An OSINT focused tool made with Nodejs!☆99Updated 3 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆73Updated 4 years ago
- ☆72Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆117Updated 4 years ago
- Hacking Tools Z0172CK☆30Updated 2 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆89Updated 6 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Updated 5 years ago
- A WLAN red team framework.☆154Updated last year
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated 3 months ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64Updated 2 years ago