Tactical Phising Attacks with ESP8266
☆65May 27, 2021Updated 4 years ago
Alternatives and similar repositories for ESP8266-Phising
Users that are interested in ESP8266-Phising are comparing it to the libraries listed below
Sorting:
- 🌐 [ New Chrome Cookies ] AVM-Tools - Advanced FUD Stealer. Features: Credential Extraction (Passwords, Cookies, Autofill), Discord Sessi…☆27Mar 1, 2026Updated last week
- An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a leg…☆80Aug 24, 2022Updated 3 years ago
- 🐱👤Email password phishing | WiFi captive portal for ESP8266 | NodeMcu fake login☆80Aug 13, 2021Updated 4 years ago
- Source code for my project on youtube named WifiX Project,its just a simple esp8266 pentesting tool including deauther and other☆31Nov 20, 2023Updated 2 years ago
- ESP8266 deauther with basic phishing captive portal (AKA evil twin attack)☆20Apr 20, 2023Updated 2 years ago
- HTTP/HTTPS based Golang botnet☆19Oct 1, 2021Updated 4 years ago
- CyberSniff Desktop Client☆18Jul 13, 2022Updated 3 years ago
- A network attack using Evil Twin Framework paired in NodeMCU ESP8266 device to exploit vulnerabilities in WiFi with low cost☆14Jul 25, 2023Updated 2 years ago
- ESP8266 Based WiFi Deauther with more features (like: WebConsole, WebConverter)☆10Jan 3, 2023Updated 3 years ago
- a simple bypass for the file upload limit for discord☆11Nov 8, 2021Updated 4 years ago
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 11 years ago
- Cheap Yellow Display Marauder Box Build☆62May 7, 2025Updated 10 months ago
- Evil Twin Attack For ESP8266, Captive Portal + Fake AP + Changeable Index, Micropython☆32Feb 7, 2021Updated 5 years ago
- ESP32 Camera Hacking Workshop☆14Feb 17, 2020Updated 6 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- Collection of Vulnerable Websites containing File Upload Vulnerability for practicing skill☆13Jun 6, 2022Updated 3 years ago
- Bluetooth speaker killer☆34Jun 1, 2024Updated last year
- Checks the OVH API to see if an IP address is in forced mitigation mode and sends Discord alerts.☆12Oct 18, 2021Updated 4 years ago
- ESP32 + NRF24L01 2.4 GHz noise generator, designed to jam Bluetooth☆16Jan 28, 2023Updated 3 years ago
- a physical pentesting toolkit on a regular Raspberry Pi Pico☆15Jun 25, 2024Updated last year
- Vandalized version of the M5-Nemo☆15Jun 6, 2024Updated last year
- Captive portal honeypot for ESP8266☆73Oct 26, 2022Updated 3 years ago
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- WiFi captive portal for ESP8266 for phishing WiFi passwords☆858May 19, 2022Updated 3 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆22Jan 10, 2021Updated 5 years ago
- frequency scan and jamming☆28Dec 11, 2016Updated 9 years ago
- Effortlessly browse and manage your files with ease using Tiny File Manager [WH1Z-Edition], a compact single-file PHP file manager.☆25Feb 13, 2024Updated 2 years ago
- ☆22Jun 1, 2024Updated last year
- Low-cost WarShipping with built-in geofencing, WiFi recon, and Rogue AP on the ESP8266☆46Sep 16, 2022Updated 3 years ago
- Password Recovery Toolkit For Windows Written in Python 3☆25Oct 2, 2023Updated 2 years ago
- ☆29May 4, 2023Updated 2 years ago
- ☆22Aug 23, 2022Updated 3 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- HTTPBotNet☆20Mar 21, 2025Updated 11 months ago
- Purpose-built Red Team network hardware implant made from common components.☆27Mar 18, 2023Updated 2 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- An automated tool for creating ProtonVPN accounts 🌐☆21Dec 11, 2022Updated 3 years ago
- badusb联动cobaltrstrike近源攻击☆26Aug 20, 2021Updated 4 years ago