Wi-Fi Backdoors
☆42Aug 5, 2015Updated 10 years ago
Alternatives and similar repositories for wi-door
Users that are interested in wi-door are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Jul 26, 2017Updated 8 years ago
- SecurityTube Hack of the Day☆17Apr 2, 2013Updated 12 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Aug 14, 2015Updated 10 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆18Mar 24, 2014Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Convert 802.11 Packet Traces to XML and SQLITE Format☆66Mar 17, 2015Updated 11 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 11 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Multi-mode wireless LAN Based on a Software Access point for Kali Linux.☆54Sep 22, 2018Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆38Mar 24, 2014Updated 12 years ago
- Tiny lib for parsing radiotap/802.11 headers in python☆11Apr 7, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 3 months ago
- A python web application compliment to py80211 which allows you to visualize the airwaves around you with your web browser.☆16Jun 19, 2014Updated 11 years ago
- WPA/WPA2 SECURITY HACK WITHOUT BRUTE FORCE☆16Mar 7, 2017Updated 9 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 4 years ago
- Wireless Attacks in Python (Based on Blog Series)☆92Nov 16, 2013Updated 12 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- Wifi sniffing and hijacking tool☆81Sep 25, 2014Updated 11 years ago
- This is a script designed to parse Kismet .netxml output and then return a CSV file that can be uploaded to Google Maps Engine to map WEP…☆29Sep 9, 2015Updated 10 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Detect, capture, crack WPA/2 handshakes, WEP Keys and geotag with Android GPS☆215Jan 13, 2015Updated 11 years ago
- Tools for working with the 802.11B scrambler when writing Packet-in-Packet exploits.☆20Sep 15, 2013Updated 12 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- A Linux Python application to create maps of 802.11 networks☆78Oct 13, 2013Updated 12 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Oct 10, 2015Updated 10 years ago
- Linux 802.11 channel hopping utility.☆21Mar 4, 2018Updated 8 years ago
- An evil WiFi Access Point for your pocket☆41Jul 19, 2023Updated 2 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- Finds Android pattern unlock codes from a gesture.key file☆52May 21, 2014Updated 11 years ago
- Tools for 802.11 information gathering.☆119May 9, 2022Updated 3 years ago