WiPi-Hunter / PiKarma
π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)
β253Updated 6 years ago
Alternatives and similar repositories for PiKarma
Users that are interested in PiKarma are comparing it to the libraries listed below
Sorting:
- π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detectionβ¦β239Updated 4 years ago
- π‘πSearches for wifi-pineapple traces and calculate wireless network security score πβ157Updated 4 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red teβ¦β290Updated 6 months ago
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β543Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensyβ142Updated 8 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devicesβ86Updated 8 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setupβ87Updated 3 years ago
- Wireless mouse/keyboard attack with replay/transmit pocβ85Updated 8 years ago
- BadUSB in Routersβ196Updated 2 years ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ286Updated 5 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakesβ95Updated 8 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploitβ152Updated 7 years ago
- Collection of social engineering payloadsβ297Updated 7 years ago
- Tool made to automate tasks of pentesting.β165Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.β185Updated 6 years ago
- WIreless Hacking Toolsβ162Updated 11 years ago
- β224Updated 10 months ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managedβ¦β208Updated 7 years ago
- WiFi Pineapple firmware for the GL.iNet GL-AR150β121Updated 5 years ago
- Arduino Rubber Ducky Frameworkβ107Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linuxβ125Updated 6 years ago
- Mobile UI for kismetβ179Updated 7 months ago
- Pentest dropbox setup scripts for Kali Linuxβ89Updated 9 years ago
- KeySniffer device discovery tools and public advisoriesβ118Updated 8 years ago
- A tool to generate media files with malicious metadataβ124Updated 6 years ago
- HID attack payload generator for Arduinosβ164Updated 10 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ357Updated 6 months ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)β112Updated 6 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ26Updated 6 years ago
- β180Updated last year