π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)
β16Aug 13, 2018Updated 7 years ago
Alternatives and similar repositories for PiOpen
Users that are interested in PiOpen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ24Jun 18, 2018Updated 7 years ago
- π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.β18Feb 10, 2019Updated 7 years ago
- π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘β30Jul 23, 2018Updated 7 years ago
- π‘πSearches for wifi-pineapple traces and calculate wireless network security score πβ160May 14, 2020Updated 5 years ago
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β560Feb 1, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- OpenBCM - BCM for everybody (packet radio mailbox system initiated by DL8MBT)β14Jan 24, 2026Updated 2 months ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.β20Dec 10, 2022Updated 3 years ago
- Out-of-tree module for GNU Radio containing a complete OFDM implementation including GUI for reasearch and teachingβ16Mar 4, 2018Updated 8 years ago
- Version Releases of Splinter the RAT @Carpenter1010β32Nov 12, 2014Updated 11 years ago
- Tools and documentation for NNCPβ16Feb 4, 2022Updated 4 years ago
- Software, firmware and hardware designs for Ubertoothβ19Aug 30, 2015Updated 10 years ago
- A NodeMCU based wifi scanner that logs SSIDs to a text file on a sd card.β21Oct 1, 2018Updated 7 years ago
- -β11Nov 21, 2020Updated 5 years ago
- A WiFi deauthentication tool written in Cβ17Sep 20, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- β11Nov 12, 2019Updated 6 years ago
- Linux HOWTO's by 07-Jul-2012β12Feb 8, 2017Updated 9 years ago
- Sniff and decode NRF24L01+ and Bluetooth Low Energy using RTL-SDRβ26Feb 3, 2017Updated 9 years ago
- β15Dec 27, 2022Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutionsβ18Feb 15, 2025Updated last year
- Phishing can't get any easier with Tilapiaβ11Jan 2, 2023Updated 3 years ago
- This is a command line interface version of the Fivem Script Converterβ11Aug 30, 2022Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identifiedβ15Dec 7, 2018Updated 7 years ago
- Microblog Serverβ14Feb 20, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Steal users password with a fake sudo function.β43Feb 29, 2024Updated 2 years ago
- Small scripts and POCs related to digital forensicsβ18Nov 1, 2022Updated 3 years ago
- Stop and disable systemd units before removing packagesβ17Jan 26, 2026Updated 2 months ago
- ADDS (Active Directory Domain Services)β28Mar 25, 2026Updated 2 weeks ago
- GSM Snifferβ39Oct 16, 2011Updated 14 years ago
- transparent TCP-to-proxy redirectorβ16Dec 8, 2019Updated 6 years ago
- Burp Suite extension for parsing Swagger web service definition filesβ19Jul 15, 2025Updated 8 months ago
- β15May 17, 2018Updated 7 years ago
- Small management app for home router based on Raspberry Piβ17Jan 3, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Windows File Enumeration Intel Gathering Tool.β17Sep 4, 2023Updated 2 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messagesβ16Sep 15, 2013Updated 12 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesβ¦β11May 26, 2023Updated 2 years ago
- Build DIY a PS2 to OG XBOX controller adapter