MS-WEB-BN / c41nLinks
Automated rogue access point setup tool.
☆198Updated 4 years ago
Alternatives and similar repositories for c41n
Users that are interested in c41n are comparing it to the libraries listed below
Sorting:
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- Customized Password/Passphrase List inputting Target Info☆92Updated 10 months ago
- An Encrypted File transfer via AES-256-CBC☆52Updated 4 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆114Updated 2 years ago
- Full Valid Fake Data Generator☆101Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Web Application Vulnerability Scanner☆126Updated 5 years ago
- A simple script to generate a hidden url for social engineering.☆121Updated 5 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆57Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Updated 11 months ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆62Updated 2 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆55Updated 5 years ago
- A WLAN red team framework.☆156Updated 11 months ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆136Updated 2 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆194Updated 2 years ago
- ☆19Updated 6 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- A Tool that Finds, Enumerates, and Exploits Reolink Cameras.☆118Updated 4 years ago
- A Tool using Shodan and RTSP to find vulnerable cameras around the world.☆61Updated 4 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆31Updated 6 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆73Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- Perform automated network reconnaissance scans☆234Updated 2 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- ☆72Updated 2 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆232Updated last year
- Web Service write in Python for control and protect your android device remotely.☆192Updated 2 years ago