π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)
β16Aug 13, 2018Updated 7 years ago
Alternatives and similar repositories for PiOpen
Users that are interested in PiOpen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ24Jun 18, 2018Updated 7 years ago
- π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.β18Feb 10, 2019Updated 7 years ago
- π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘β30Jul 23, 2018Updated 7 years ago
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β256Sep 21, 2018Updated 7 years ago
- π‘πSearches for wifi-pineapple traces and calculate wireless network security score πβ160May 14, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β564Feb 1, 2020Updated 6 years ago
- Public version of dopescope codeβ14Jan 31, 2017Updated 9 years ago
- Lightweight Todoist workflow for Alfred 5, free of dependencies.β10Sep 16, 2023Updated 2 years ago
- A WiFi deauthentication tool written in Cβ17Sep 20, 2019Updated 6 years ago
- List of special metadata IPs used in cloud servicesβ11Aug 9, 2019Updated 6 years ago
- Signatures for wraith used to detect secrets across various sourcesβ15Jul 8, 2022Updated 3 years ago
- Sniff and decode NRF24L01+ and Bluetooth Low Energy using RTL-SDRβ26Feb 3, 2017Updated 9 years ago
- β15Dec 27, 2022Updated 3 years ago
- Tools to integrate HF TNCs to UUCPβ14Jul 20, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- WS-Attacker is a modular framework for web services Security penetration testing.β12May 16, 2019Updated 7 years ago
- All you need to build a covert SIGINT vehicleβ17Feb 26, 2020Updated 6 years ago
- Phishing can't get any easier with Tilapiaβ11Jan 2, 2023Updated 3 years ago
- This is a command line interface version of the Fivem Script Converterβ11Aug 30, 2022Updated 3 years ago
- Smart overlay for Cobalt Strike PS functionβ30Mar 9, 2019Updated 7 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identifiedβ15Dec 7, 2018Updated 7 years ago
- Microblog Serverβ14Feb 20, 2026Updated 3 months ago
- KCSEC Rubber Ducky Tookitβ11Jul 12, 2018Updated 7 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific eventsβ30Dec 13, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SubdomainDB is a simple self-hosted API that allows you to maintain your own subdomain database.β31Jan 8, 2018Updated 8 years ago
- Vulnerability Scannerβ11Dec 23, 2014Updated 11 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesβ¦β11May 26, 2023Updated 2 years ago
- Datagram's Esports Tournament Overlay Control Systemβ12May 13, 2026Updated last week
- Reaque is an mobile tool where we can share and find things related to Mozambique, the people and things there. From reflections and cultβ¦β13Sep 10, 2019Updated 6 years ago
- Schematics & Firmware for self-tuning portable RF Jammerβ12Feb 2, 2018Updated 8 years ago
- Crowdsourced event coverage system developed by Pittsburgh IndyMedia during the G20. Incorporates twitter, flickr, google maps, podcastβ¦β25Feb 15, 2010Updated 16 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.β13Oct 15, 2021Updated 4 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Timβ¦β10Jul 29, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An iGoogle like drag and drop portal based on Prototype and Scriptaculousβ34Oct 19, 2015Updated 10 years ago
- Bat file to collect software and hardware system information without admin permissions.β14Feb 17, 2022Updated 4 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a sβ¦β12Apr 8, 2017Updated 9 years ago
- Enable Slack notifications in MotionEye OS to alert you of any detected movement.β11Oct 11, 2016Updated 9 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.β37Apr 9, 2021Updated 5 years ago
- Lightweight C# windows agent for Apfellβ17Mar 16, 2020Updated 6 years ago
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be β¦β18Aug 12, 2025Updated 9 months ago