WiPi-Hunter / PiDense
ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
β521Updated 4 years ago
Related projects: β
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).β591Updated last year
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.β414Updated 6 years ago
- β419Updated this week
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilitiesβ265Updated last month
- Community-built scenarios for Wifiphisherβ334Updated 3 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy β¦β1,097Updated 4 years ago
- β355Updated this week
- Encoding Tools for Rubber Duckyβ414Updated 8 months ago
- π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detectionβ¦β229Updated 4 years ago
- Hacking systems with the automation of PasteJacking attacks.β381Updated 5 years ago
- The New Hacking Frameworkβ677Updated 3 years ago
- Bluetooth Honeypotβ234Updated 3 years ago
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β247Updated 5 years ago
- Bluetooth hacking toolsβ385Updated last year
- Exploitation Framework for ATtiny85 Based HID Attacksβ328Updated 4 years ago
- caplets and proxy modules.β480Updated 6 months ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.β171Updated 3 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer modβ¦β965Updated 3 years ago
- Automatically exported from code.google.com/p/ghost-phisherβ307Updated 4 years ago
- The Official WiFi Pineapple Module Repository for the NANO & TETRAβ463Updated last year
- NXcrypt - 'python backdoor' frameworkβ363Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be usβ¦β713Updated 4 years ago
- bettercap's web UIβ315Updated last week
- transform your payload.exe into one fake word doc (.ppt)β459Updated 4 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β318Updated last month
- β293Updated this week
- coWPAtty: WPA2-PSK Crackingβ180Updated 5 years ago
- Git all your favorite tools in one clickβ261Updated 2 years ago
- network reconnaissance toolkitβ418Updated 5 years ago
- Inject malicious code into *.debsβ261Updated 2 years ago