Vivek-Ramachandran / wi-door
Wi-Fi Backdoors
☆38Updated 9 years ago
Alternatives and similar repositories for wi-door:
Users that are interested in wi-door are comparing it to the libraries listed below
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- WPS scan and pwn tool☆66Updated 5 years ago
- new WPS attack tool☆55Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆39Updated 3 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Updated 3 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆19Updated 10 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 9 years ago
- Post-Exploitation Framework☆75Updated 8 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- A quick, dirty, and effective USB RubberDucky (hak5.com) firmware programming script. Cause typing is hard.☆21Updated 10 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- Stagefright Android exploit☆18Updated 2 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- ☆21Updated 7 years ago
- hackpack to go with lazykali on menu application Kali Linux☆29Updated 10 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆29Updated 11 years ago