MS-WEB-BN / c41nLinks
Automated rogue access point setup tool.
☆199Updated 4 years ago
Alternatives and similar repositories for c41n
Users that are interested in c41n are comparing it to the libraries listed below
Sorting:
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- Customized Password/Passphrase List inputting Target Info☆95Updated 11 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆52Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆116Updated 2 years ago
- ☆19Updated 6 years ago
- Web Application Vulnerability Scanner☆126Updated 5 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆90Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- Web Service write in Python for control and protect your android device remotely.☆192Updated 2 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆136Updated 2 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆194Updated 2 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago
- Full Valid Fake Data Generator☆101Updated last year
- An OSINT focused tool made with Nodejs!☆99Updated 3 years ago
- A WLAN red team framework.☆154Updated last year
- This Script Will Detect Canary Token in Microsoft Word Documents☆56Updated 5 years ago
- A Tool using Shodan and RTSP to find vulnerable cameras around the world.☆61Updated 4 years ago
- An easy to handle hacking script, SSH Forcebrute, FTP Forcebrute and many others features☆64Updated 3 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- A simple script to generate a hidden url for social engineering.☆121Updated 5 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆153Updated 2 weeks ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Simple Backdoor Manager with Python (based on weevely)☆95Updated 7 months ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆124Updated last year
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- ☆72Updated 2 years ago