WiPi-Hunter / PiUserLinks
π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘
β31Updated 7 years ago
Alternatives and similar repositories for PiUser
Users that are interested in PiUser are comparing it to the libraries listed below
Sorting:
- π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)β16Updated 7 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ24Updated 7 years ago
- Simple Karma Attackβ69Updated 5 years ago
- π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.β18Updated 6 years ago
- Shodan.io Command Line Interfaceβ44Updated 4 years ago
- π‘πSearches for wifi-pineapple traces and calculate wireless network security score πβ159Updated 5 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerabβ¦β128Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.β67Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)β51Updated 7 years ago
- Social Engineering Toysβ36Updated 9 years ago
- Script is a proof of concept how to control your machine by using social media sites.β23Updated 7 years ago
- Enterprise WPA Wireless Tool Suiteβ86Updated 3 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.β85Updated 4 years ago
- Intelligent threat hunter and phishing serversβ48Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML resultsβ39Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testersβ17Updated 10 years ago
- Malicious Link Blogβ25Updated 2 years ago
- Massive arsenal of hacker tools...β80Updated 8 years ago
- β15Updated 9 years ago
- Determine everything you need to know to about a systemβ32Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploitβ85Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)β36Updated 6 years ago
- Get clients and access points.β49Updated 6 years ago
- PHP Phishing Frameworkβ28Updated 11 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.β84Updated 7 years ago
- β82Updated 2 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kimβ17Updated 10 years ago
- This tool extract domains from IP address based in the information saved in virustotal.β24Updated 8 years ago
- Use Invoke-PSImage to deliver a payload in an Imageβ53Updated 7 years ago
- Passive recon / OSINT automation scriptβ39Updated 7 years ago