π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.
β18Feb 10, 2019Updated 7 years ago
Alternatives and similar repositories for PiDeception
Users that are interested in PiDeception are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘β30Jul 23, 2018Updated 7 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ24Jun 18, 2018Updated 7 years ago
- NLog Target for GrayLog2β17Mar 29, 2019Updated 7 years ago
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β256Sep 21, 2018Updated 7 years ago
- π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detectionβ¦β237Jun 8, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- β32May 9, 2021Updated 4 years ago
- Honeybadger Red Editionβ13Sep 13, 2017Updated 8 years ago
- Extract indicators of compromise from text, including "escaped" ones.β163Apr 19, 2020Updated 5 years ago
- An email client in CLI, designed specifically for spearphishing.β13Jul 25, 2019Updated 6 years ago
- Tools and documentation for NNCPβ16Feb 4, 2022Updated 4 years ago
- a low(zero) cost threat intelligence&response tool against phishing domainsβ157Dec 8, 2022Updated 3 years ago
- Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMalβ¦β270Mar 11, 2024Updated 2 years ago
- Free Advance encryptor for Anon Cloudβ16Jan 26, 2023Updated 3 years ago
- A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! π»β125Sep 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- OpenBCM - BCM for everybody (packet radio mailbox system initiated by DL8MBT)β14Jan 24, 2026Updated 2 months ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to seaβ¦β135Dec 10, 2021Updated 4 years ago
- Stealthy backdoor for Windows operating systemsβ285Feb 13, 2020Updated 6 years ago
- Phishing can't get any easier with Tilapiaβ11Jan 2, 2023Updated 3 years ago
- All you need to build a covert SIGINT vehicleβ16Feb 26, 2020Updated 6 years ago
- Easily generate prompts for use in https://github.com/AUTOMATIC1111/stable-diffusion-webuiβ11Oct 29, 2022Updated 3 years ago
- This is a command line interface version of the Fivem Script Converterβ11Aug 30, 2022Updated 3 years ago
- Microblog Serverβ14Feb 20, 2026Updated last month
- Small scripts and POCs related to digital forensicsβ18Nov 1, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ADDS (Active Directory Domain Services)β28Mar 25, 2026Updated 2 weeks ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detectβ12Aug 1, 2020Updated 5 years ago
- transparent TCP-to-proxy redirectorβ16Dec 8, 2019Updated 6 years ago
- Site fast fuzzing with chorme extension.β24Feb 4, 2022Updated 4 years ago
- Hash cracking WebApp & Server for hashcatβ47Jul 20, 2022Updated 3 years ago
- Skripti kotimaisten internet-mediasisΓ€ltΓΆjen (Areena, Ruutu, Katsomo, TV5) automaattiseen tallennukseenβ14Nov 4, 2020Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugsβ23Jul 26, 2019Updated 6 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilitiesβ31Jan 17, 2022Updated 4 years ago
- Windows File Enumeration Intel Gathering Tool.β17Sep 4, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Reaque is an mobile tool where we can share and find things related to Mozambique, the people and things there. From reflections and cultβ¦β13Sep 10, 2019Updated 6 years ago
- Datagram's Esports Tournament Overlay Control Systemβ12Mar 25, 2026Updated 2 weeks ago
- a benchmarking&stressing tool that can send raw HTTP requestsβ165Sep 24, 2022Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.β13Oct 15, 2021Updated 4 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Timβ¦β10Jul 29, 2020Updated 5 years ago
- Lightweight C# windows agent for Apfellβ17Mar 16, 2020Updated 6 years ago
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be β¦β17Aug 12, 2025Updated 7 months ago