MS-WEB-BN / c41nLinks
Automated rogue access point setup tool.
☆199Updated 4 years ago
Alternatives and similar repositories for c41n
Users that are interested in c41n are comparing it to the libraries listed below
Sorting:
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆246Updated last year
- Customized Password/Passphrase List inputting Target Info☆96Updated last year
- An Encrypted File transfer via AES-256-CBC☆52Updated 4 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆111Updated 2 years ago
- Full Valid Fake Data Generator☆102Updated last year
- Learn how to set up a fake authentication web page on a fake WiFi network.☆117Updated 2 years ago
- ☆19Updated 6 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆56Updated 5 years ago
- Web Application Vulnerability Scanner☆126Updated 5 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Updated 2 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago
- Simple Backdoor Manager with Python (based on weevely)☆95Updated 8 months ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆137Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- A WLAN red team framework.☆155Updated last year
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- ☆72Updated 2 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆66Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64Updated 2 years ago
- PhishX - The Complete Spear Phishing Tool☆108Updated 7 years ago
- WebHook for Red Team☆26Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆195Updated 2 years ago
- Perform automated network reconnaissance scans☆237Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆69Updated 2 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆17Updated 4 years ago