P0cL4bs / wifipumpkin3
Powerful framework for rogue access point attack.
☆2,077Updated last year
Alternatives and similar repositories for wifipumpkin3:
Users that are interested in wifipumpkin3 are comparing it to the libraries listed below
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆992Updated 4 years ago
- Efficient and advanced man in the middle framework☆2,073Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,261Updated 4 months ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,132Updated 4 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆1,390Updated last year
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,115Updated 4 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,173Updated 2 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,080Updated 10 months ago
- Phishing Tool & Information Collector☆4,240Updated 3 months ago
- Automatically brute force all services running on a target.☆2,030Updated 6 months ago
- UFONet - Denial of Service Toolkit☆2,282Updated 5 months ago
- ☆975Updated 2 years ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆891Updated last year
- MDK4☆671Updated 6 months ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,038Updated 2 years ago
- Fluxion is a remake of linset by vk496 with enhanced functionality.☆5,124Updated last year
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,692Updated 6 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆2,949Updated 5 months ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆909Updated 5 years ago
- Small tool to capture packets from wlan devices.☆1,906Updated this week
- venom - C2 shellcode generator/compiler/handler☆1,825Updated last year
- A collection of captive portals for phishing using a WiFi Pineapple☆1,029Updated 8 months ago
- Hacking tools pack & backdoors generator.☆1,719Updated this week
- MSFvenom Payload Creator (MSFPC)☆1,242Updated 3 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,214Updated 3 years ago
- Websploit is a high level MITM framework☆1,171Updated last year
- Tools for Pentesting☆1,996Updated last year
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆2,600Updated 6 months ago
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,636Updated this week
- Striker is an offensive information and vulnerability scanner.☆2,252Updated last year