WiPi-Hunter / PiFinger
π‘πSearches for wifi-pineapple traces and calculate wireless network security score π
β157Updated 4 years ago
Alternatives and similar repositories for PiFinger:
Users that are interested in PiFinger are comparing it to the libraries listed below
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β252Updated 6 years ago
- π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detectionβ¦β240Updated 4 years ago
- Autoexploitation of some of the most common vulnerabilities in wildβ122Updated 6 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ26Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploitβ83Updated 6 years ago
- β192Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ283Updated 5 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS andβ¦β115Updated 4 years ago
- A tool to generate media files with malicious metadataβ124Updated 6 years ago
- Tools that are related to pentest and network securityβ99Updated 3 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting β¦β87Updated 6 years ago
- myBFF - a Brute Force Frameworkβ139Updated 2 weeks ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --β76Updated 8 years ago
- β66Updated 7 years ago
- The Hacker's ToolBoxβ186Updated 7 years ago
- Passive Vulnerability Auditorβ130Updated 8 years ago
- Automates some pentest jobs via nmap xml fileβ323Updated 6 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerabβ¦β126Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linuxβ124Updated 5 years ago
- A simple XSS finding toolβ109Updated 6 years ago
- Avoidz tool to bypass most A.V softwaresβ139Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managedβ¦β207Updated 7 years ago
- search for hosts info with shodanβ230Updated 3 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.β166Updated 5 years ago
- π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘β30Updated 6 years ago
- Vulnerability scanner based on vulners.com audit APIβ65Updated 6 years ago
- Poison, reset, spoof, redirect MITM scriptβ126Updated last year
- War Child denial of service testing suiteβ122Updated 7 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.β121Updated 5 years ago
- β101Updated 6 years ago