π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)
β16Aug 13, 2018Updated 7 years ago
Alternatives and similar repositories for PiOpen
Users that are interested in PiOpen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ24Jun 18, 2018Updated 7 years ago
- π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.β18Feb 10, 2019Updated 7 years ago
- π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘β30Jul 23, 2018Updated 7 years ago
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β256Sep 21, 2018Updated 7 years ago
- π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detectionβ¦β238Jun 8, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β563Feb 1, 2020Updated 6 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.β20Dec 10, 2022Updated 3 years ago
- Wireshark captures in Windows using the WLANPi as an adapterβ13Oct 15, 2019Updated 6 years ago
- Honeybadger Red Editionβ13Sep 13, 2017Updated 8 years ago
- Version Releases of Splinter the RAT @Carpenter1010β32Nov 12, 2014Updated 11 years ago
- Public version of dopescope codeβ14Jan 31, 2017Updated 9 years ago
- Reporting Tips for Penetration Testersβ30Jun 9, 2021Updated 4 years ago
- Yazi previewer multiplexerβ24Apr 23, 2026Updated last week
- fault finding serviceβ16Jun 6, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Software, firmware and hardware designs for Ubertoothβ19Aug 30, 2015Updated 10 years ago
- Python and Bash scripts to extract ADS-B data about aircraft that fly low over your locationβ10Nov 28, 2021Updated 4 years ago
- A NodeMCU based wifi scanner that logs SSIDs to a text file on a sd card.β21Oct 1, 2018Updated 7 years ago
- Mode S multilateration clientβ22Aug 29, 2023Updated 2 years ago
- The package for Sublime Text Editorβ14Jun 30, 2022Updated 3 years ago
- -β11Nov 21, 2020Updated 5 years ago
- A WiFi deauthentication tool written in Cβ17Sep 20, 2019Updated 6 years ago
- β11Nov 12, 2019Updated 6 years ago
- Signatures for wraith used to detect secrets across various sourcesβ15Jul 8, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- β15Dec 27, 2022Updated 3 years ago
- Easily generate prompts for use in https://github.com/AUTOMATIC1111/stable-diffusion-webuiβ11Oct 29, 2022Updated 3 years ago
- Smart overlay for Cobalt Strike PS functionβ30Mar 9, 2019Updated 7 years ago
- Steal users password with a fake sudo function.β44Feb 29, 2024Updated 2 years ago
- Small scripts and POCs related to digital forensicsβ18Nov 1, 2022Updated 3 years ago
- GSM Snifferβ39Oct 16, 2011Updated 14 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific eventsβ30Dec 13, 2020Updated 5 years ago
- transparent TCP-to-proxy redirectorβ16Dec 8, 2019Updated 6 years ago
- Burp Suite extension for parsing Swagger web service definition filesβ19Jul 15, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A LinkedIn Scraperβ15Aug 20, 2018Updated 7 years ago
- Vulnerability Scannerβ11Dec 23, 2014Updated 11 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messagesβ16Sep 15, 2013Updated 12 years ago
- Windows File Enumeration Intel Gathering Tool.β17Sep 4, 2023Updated 2 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesβ¦β11May 26, 2023Updated 2 years ago
- β13Sep 17, 2025Updated 7 months ago
- Reaque is an mobile tool where we can share and find things related to Mozambique, the people and things there. From reflections and cultβ¦