MS-WEB-BN / c41nLinks
Automated rogue access point setup tool.
☆197Updated 4 years ago
Alternatives and similar repositories for c41n
Users that are interested in c41n are comparing it to the libraries listed below
Sorting:
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆237Updated 11 months ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆111Updated 2 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Web Application Vulnerability Scanner☆126Updated 4 years ago
- Customized Password/Passphrase List inputting Target Info☆90Updated 8 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆54Updated 4 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆133Updated last year
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆136Updated 5 years ago
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 4 years ago
- Full Valid Fake Data Generator☆99Updated 9 months ago
- Find exploits in local and online database☆76Updated 9 months ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆134Updated 4 years ago
- Web Service write in Python for control and protect your android device remotely.☆191Updated 2 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆114Updated 4 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆227Updated 11 months ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆121Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆59Updated 2 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- Simple Backdoor Manager with Python (based on weevely)☆94Updated 4 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆98Updated 8 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆88Updated 9 months ago
- An OSINT focused tool made with Nodejs!☆94Updated 2 years ago
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago