π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.
β18Feb 10, 2019Updated 7 years ago
Alternatives and similar repositories for PiDeception
Users that are interested in PiDeception are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)β16Aug 13, 2018Updated 7 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ24Jun 18, 2018Updated 7 years ago
- π‘πSearches for wifi-pineapple traces and calculate wireless network security score πβ160May 14, 2020Updated 6 years ago
- π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detectionβ¦β238Jun 8, 2020Updated 5 years ago
- β17Jan 29, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to whitelist USB devices to prevent data leaksβ16Jan 25, 2018Updated 8 years ago
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β564Feb 1, 2020Updated 6 years ago
- A RADIUS authentication server audit toolβ79Oct 15, 2018Updated 7 years ago
- Honeybadger Red Editionβ13Sep 13, 2017Updated 8 years ago
- Extract indicators of compromise from text, including "escaped" ones.β163Apr 19, 2020Updated 6 years ago
- Public version of dopescope codeβ14Jan 31, 2017Updated 9 years ago
- (Unmaintained) Server side program maintains communication channels between server and mobile devices.β37Nov 29, 2013Updated 12 years ago
- pivottablejs for air-gapped systemsβ13Aug 14, 2024Updated last year
- An email client in CLI, designed specifically for spearphishing.β13Jul 25, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tools and documentation for NNCPβ16Feb 4, 2022Updated 4 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDSβ108Aug 13, 2018Updated 7 years ago
- Side channel-based network measurement tools.β15Sep 1, 2015Updated 10 years ago
- a low(zero) cost threat intelligence&response tool against phishing domainsβ157Dec 8, 2022Updated 3 years ago
- nano 3d is a small modern software rasterizerβ13Mar 11, 2018Updated 8 years ago
- Code repository for Raspberry Pi for Secret Agents Third Edition, published by Packtβ13Jan 14, 2021Updated 5 years ago
- BU related toolboxβ11Apr 4, 2017Updated 9 years ago
- A scan of all .gov.uk sites for the most common security headers or lack ofβ15Updated this week
- Low Code Editorβ14Dec 4, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Linux HOWTO's by 07-Jul-2012β12Feb 8, 2017Updated 9 years ago
- Free Advance encryptor for Anon Cloudβ16Jan 26, 2023Updated 3 years ago
- A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! π»β127Sep 6, 2022Updated 3 years ago
- Quickstart d3 generatorβ11Jun 11, 2016Updated 9 years ago
- Create spatialized sounds for playback from javascript using jsonicβ14Jan 22, 2011Updated 15 years ago
- There are several solutions,hints and also some tricks about Android in this repository.β10Jan 3, 2024Updated 2 years ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to seaβ¦β135Dec 10, 2021Updated 4 years ago
- Tools to integrate HF TNCs to UUCPβ14Jul 20, 2022Updated 3 years ago
- Stealthy backdoor for Windows operating systemsβ284Feb 13, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- All you need to build a covert SIGINT vehicleβ17Feb 26, 2020Updated 6 years ago
- A Social Virtual Private Network based on IP over P2P Overlayβ20May 7, 2009Updated 17 years ago
- People tracking software using laser range scannerβ11Jul 9, 2015Updated 10 years ago
- Small scripts and POCs related to digital forensicsβ18Nov 1, 2022Updated 3 years ago
- Serial Over UDP/IPβ14May 2, 2013Updated 13 years ago
- ROS driver for the Evologics Underwater Modemsβ14Apr 29, 2020Updated 6 years ago
- Stealing Wi-Fi passwords via browser's cache poisoning.β150Feb 19, 2022Updated 4 years ago