Pr0x13 / iDict
iCloud Apple iD BruteForcer
☆863Updated last year
Alternatives and similar repositories for iDict:
Users that are interested in iDict are comparing it to the libraries listed below
- iCloud Bruteforce PoC - with MultiCurl☆253Updated 9 years ago
- AppleID bruteforce p0c☆1,314Updated 5 years ago
- wireless hacking - This is automated wireless hacking tool☆1,251Updated 2 years ago
- OpenSource tool for iCloud backup extraction☆646Updated 6 years ago
- Inject code and spy on wifi users☆2,595Updated 3 years ago
- Network Attack Tool☆1,462Updated last year
- Pre-migration repository. New repository ➙☆859Updated 7 years ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆311Updated 5 years ago
- Arduino code to brute force Macbook's 4-digit iCloud PINs☆221Updated 6 years ago
- An offline Wi-Fi Protected Setup brute-force utility☆1,596Updated last year
- Snoopy: A distributed tracking and data interception framework☆600Updated 12 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,089Updated 6 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,666Updated 5 years ago
- Mac OSX ARP spoof (MiTM) tool that can also plug into Gource☆264Updated 5 years ago
- iOS 8.3 Mail.app inject kit☆358Updated 6 years ago
- This repository contains some bettercap transparent proxy example modules.☆282Updated 7 years ago
- HT-WPS Breaker (High Touch WPS Breaker)☆719Updated 2 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆858Updated 6 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,215Updated 3 years ago
- powerful auto-backdooring utility☆746Updated 7 years ago
- Create fake AP in Kali with 1 command☆268Updated 9 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,115Updated 4 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,247Updated 8 years ago
- Bruteforce the 4-digit passcode on iOS 8☆114Updated 9 years ago
- A fast and stealthy credential harvester☆623Updated last year
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,107Updated 8 years ago
- xnu local privilege escalation via cve-2015-???? & cve-2015-???? for 10.10.5, 0day at the time | poc or gtfo☆395Updated 9 years ago
- ☆406Updated 9 months ago
- Framework for Man-In-The-Middle attacks☆3,606Updated 6 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆254Updated 7 years ago