WiPi-Hunter / PiKarmaLinks
π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)
β254Updated 6 years ago
Alternatives and similar repositories for PiKarma
Users that are interested in PiKarma are comparing it to the libraries listed below
Sorting:
- π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detectionβ¦β240Updated 5 years ago
- π‘πSearches for wifi-pineapple traces and calculate wireless network security score πβ157Updated 5 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakesβ96Updated 8 years ago
- BadUSB in Routersβ197Updated 2 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red teβ¦β293Updated 7 months ago
- PoC tool to demonstrate vulnerabilities in wireless input devicesβ86Updated 8 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensyβ143Updated 8 years ago
- Tool made to automate tasks of pentesting.β166Updated 5 years ago
- HID attack payload generator for Arduinosβ165Updated 11 months ago
- WiFi Pineapple DIYβ74Updated 8 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setupβ87Updated 3 years ago
- Wireless mouse/keyboard attack with replay/transmit pocβ86Updated 8 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)β113Updated 6 years ago
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β544Updated 5 years ago
- β224Updated last year
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ286Updated 6 years ago
- Mobile UI for kismetβ179Updated 8 months ago
- A unified console to perform the "kill chain" stages of attacks.β204Updated last year
- KeySniffer device discovery tools and public advisoriesβ118Updated 8 years ago
- A tool to generate media files with malicious metadataβ124Updated 6 years ago
- An automated Wireless RogueAP MITM attack framework.β187Updated 6 years ago
- P4wnP1 - WiFi covert channel - Client agent (experimental Proof of Concept) by MaMe82β84Updated 7 years ago
- Collection of social engineering payloadsβ296Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managedβ¦β209Updated 7 years ago
- Arduino Rubber Ducky Frameworkβ107Updated 6 years ago
- search for hosts info with shodanβ230Updated 4 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.β166Updated 5 years ago
- Krack POCβ126Updated 7 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linuxβ125Updated 6 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.β84Updated 7 years ago