Vivek-Ramachandran / wi-door
Wi-Fi Backdoors
☆38Updated 9 years ago
Alternatives and similar repositories for wi-door
Users that are interested in wi-door are comparing it to the libraries listed below
Sorting:
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆39Updated 4 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 8 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆19Updated 10 years ago
- new WPS attack tool☆55Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- MiTM tools and scripts☆19Updated 9 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- WPS scan and pwn tool☆67Updated 5 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆22Updated 3 years ago
- Pentest tools for Windows hacking processes☆13Updated 8 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- Password cracking utility☆53Updated 4 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Updated 7 years ago
- Maltego with a twist of wireless☆25Updated 10 years ago
- Post-Exploitation Framework☆77Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago