π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)
β256Sep 21, 2018Updated 7 years ago
Alternatives and similar repositories for PiKarma
Users that are interested in PiKarma are comparing it to the libraries listed below
Sorting:
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β556Feb 1, 2020Updated 6 years ago
- π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detectionβ¦β239Jun 8, 2020Updated 5 years ago
- π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)β16Aug 13, 2018Updated 7 years ago
- π‘πSearches for wifi-pineapple traces and calculate wireless network security score πβ160May 14, 2020Updated 5 years ago
- π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘β30Jul 23, 2018Updated 7 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ24Jun 18, 2018Updated 7 years ago
- π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.β18Feb 10, 2019Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ291May 14, 2019Updated 6 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ373Apr 27, 2023Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β443Jul 11, 2017Updated 8 years ago
- ESP8266 Pen-testing Deauther made into a sonic screwdriver controller.β16Dec 4, 2021Updated 4 years ago
- Automated script to search in SMB protocol for availables pipe namesβ25Apr 19, 2018Updated 7 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pacβ¦β2,264Dec 18, 2021Updated 4 years ago
- This is a fast script to deauth all, a network or target with a built in oui lookup tool.β19Jul 8, 2018Updated 7 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewallβ83Oct 24, 2019Updated 6 years ago
- Tool to identify all domains contained in an IP anonymouslyβ15Jun 4, 2017Updated 8 years ago
- Listing subdomains about a main domainβ59May 9, 2018Updated 7 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.β81Dec 24, 2017Updated 8 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerleverβ124Nov 18, 2023Updated 2 years ago
- Protect your parents from phishingβ40Dec 4, 2017Updated 8 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...β71Apr 10, 2019Updated 6 years ago
- wide range mass audit toolkitβ1,034Oct 3, 2018Updated 7 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.β1,784Jul 27, 2024Updated last year
- Encrypted exploit delivery for the massesβ270Sep 25, 2019Updated 6 years ago
- Hackmelock Android applicationβ17Apr 11, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestrationβ109Sep 26, 2017Updated 8 years ago
- runtime code injector for Linuxβ26May 29, 2011Updated 14 years ago
- Inject malicious code into *.debsβ284Apr 26, 2022Updated 3 years ago
- Rogue AP killerβ92Jan 24, 2018Updated 8 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/β653Mar 14, 2024Updated last year
- Powershell Empire Persistence finderβ119Jan 30, 2017Updated 9 years ago
- A script written lazily for generating cross-platform backdoors on the go :)β190Oct 16, 2018Updated 7 years ago
- Multiplatform payload dropperβ281Aug 17, 2021Updated 4 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.β273Feb 26, 2014Updated 12 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.β418Aug 10, 2023Updated 2 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.β134May 27, 2019Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.β152Oct 20, 2018Updated 7 years ago
- Python / C# Unmanaged PowerShell based RATβ771Mar 29, 2023Updated 2 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setupβ90Nov 23, 2021Updated 4 years ago