WiPi-Hunter / PiSavarLinks
π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection)
β242Updated 5 years ago
Alternatives and similar repositories for PiSavar
Users that are interested in PiSavar are comparing it to the libraries listed below
Sorting:
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β256Updated 6 years ago
- π‘πSearches for wifi-pineapple traces and calculate wireless network security score πβ158Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensyβ146Updated 8 years ago
- WIreless Hacking Toolsβ166Updated 12 years ago
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β549Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.β186Updated 6 years ago
- HID attack payload generator for Arduinosβ165Updated last year
- SSIDs for the Hak5 Wifi Pineapple's PineAP setupβ87Updated 3 years ago
- Intelligence and Reconnaissance Package/Bundle installer.β242Updated 4 years ago
- A unified console to perform the "kill chain" stages of attacks.β205Updated 2 years ago
- Arduino Rubber Ducky Frameworkβ107Updated 6 years ago
- Mobile UI for kismetβ181Updated 11 months ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakesβ95Updated 8 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red teβ¦β296Updated 10 months ago
- Tool made to automate tasks of pentesting.β168Updated 5 years ago
- Evil Portal for the Wifi Pineapple Nano and Wifi Pineapple Tetraβ127Updated 5 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devicesβ87Updated 8 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerabβ¦β128Updated 7 years ago
- β229Updated last year
- β150Updated 2 years ago
- Offensive DNS serverβ66Updated 7 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β237Updated 4 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Duckyβ68Updated 6 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ356Updated 3 weeks ago
- Pentest dropbox setup scripts for Kali Linuxβ89Updated 9 years ago
- Automates some pentest jobs via nmap xml fileβ324Updated 7 years ago
- Social engineering tool for human hackingβ121Updated 8 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!β78Updated 7 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)β116Updated 6 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.β266Updated 11 years ago