MS-WEB-BN / h4rpy
Automated WPA/WPA2 PSK attack tool.
☆568Updated 3 years ago
Alternatives and similar repositories for h4rpy:
Users that are interested in h4rpy are comparing it to the libraries listed below
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆617Updated 2 years ago
- Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and…☆919Updated 3 years ago
- Automated tool for WiFi hacking.☆735Updated 3 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆257Updated 6 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆428Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆741Updated 5 years ago
- This is a wifi Brute Force. script undetectable and secure!☆350Updated 4 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆471Updated 6 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,009Updated 4 years ago
- Websploit is a high level MITM framework☆1,188Updated last year
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆310Updated 9 months ago
- A tool for remote ADB exploitation in Python3 for all Machines.☆828Updated 7 months ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆900Updated last year
- Lockphish is a tool for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode[No lon…☆397Updated 4 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆960Updated 6 years ago
- Verify if email exists☆378Updated 3 years ago
- Wireless Jammer to Disconnect Nearby Access-Points and Stations.☆202Updated 3 years ago
- Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info☆456Updated 7 months ago
- Hide your payload into .jpg file☆393Updated 3 years ago
- A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner☆705Updated last year
- Ha3Mrx Pentesting and Security Hacking☆402Updated 5 months ago
- Community-built scenarios for Wifiphisher☆356Updated 4 years ago
- Tool Information Gathering Write By Python.☆735Updated 2 years ago
- Automated brute-forcing attack tool.☆402Updated 4 years ago
- Hacking systems with the automation of PasteJacking attacks.☆397Updated 6 months ago
- Websploit is an advanced MITM framework.☆294Updated 7 years ago
- Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/☆231Updated last year
- Future Of Phishing With less delay☆903Updated 2 years ago
- Update Version 3.1 added free SMS messaging.☆479Updated 3 years ago
- Program to attempt to brute force all wifi networks in range of a device, and return a possible set of networks to connect to and the pas…☆637Updated last year