P0cL4bs / wifipumpkin3Links
Powerful framework for rogue access point attack.
☆2,211Updated last year
Alternatives and similar repositories for wifipumpkin3
Users that are interested in wifipumpkin3 are comparing it to the libraries listed below
Sorting:
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,019Updated 4 years ago
- Efficient and advanced man in the middle framework☆2,113Updated 2 years ago
- Fluxion is a remake of linset by vk496 with enhanced functionality.☆5,326Updated last year
- MDK4☆710Updated 11 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,327Updated 9 months ago
- A collection of wordlists dictionaries for password cracking☆1,328Updated 2 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,141Updated last year
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,184Updated 2 years ago
- Rewrite of the popular wireless network auditor, "wifite" - original by @derv82☆1,189Updated 2 weeks ago
- ☆1,000Updated 2 years ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,034Updated this week
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,184Updated 5 years ago
- Websploit is a high level MITM framework☆1,201Updated 2 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,124Updated 5 years ago
- Automatically exported from code.google.com/p/fern-wifi-cracker☆1,395Updated 9 months ago
- Small tool to capture packets from wlan devices.☆1,975Updated this week
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,187Updated this week
- The famous WPA precomputed cracker, Migrated from Google.☆1,102Updated last year
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,717Updated 4 months ago
- The LAZY script will make your life easier, and of course faster.☆4,219Updated 3 years ago
- Python Remote Administration Tool (RAT)☆3,357Updated last year
- venom - C2 shellcode generator/compiler/handler☆1,878Updated last year
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆854Updated 9 months ago
- Tools for Pentesting☆2,066Updated last year
- Phishing Tool & Information Collector☆4,416Updated 8 months ago
- Rewrite of the popular wireless network auditor, "wifite"☆7,047Updated 10 months ago
- Phishing Campaign Toolkit☆2,410Updated 11 months ago
- Automatically brute force all services running on a target.☆2,103Updated 10 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,083Updated 9 months ago
- Common User Passwords Profiler (CUPP)☆4,863Updated last year