WiPi-Hunter / PiUser
π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘
β30Updated 6 years ago
Alternatives and similar repositories for PiUser
Users that are interested in PiUser are comparing it to the libraries listed below
Sorting:
- π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)β15Updated 6 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ26Updated 6 years ago
- π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.β19Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)β50Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox β¦β38Updated 2 years ago
- Simple Karma Attackβ69Updated 4 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploitβ84Updated 6 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.β13Updated 6 years ago
- Enterprise WPA Wireless Tool Suiteβ84Updated 2 years ago
- A swiss army knife for pentesting Windows/Active Directory environmentsβ14Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sysβ¦β12Updated 8 years ago
- Intelligent threat hunter and phishing serversβ47Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you providedβ33Updated 3 years ago
- NetRipper - Smart traffic sniffing for penetration testersβ17Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabledβ55Updated 7 years ago
- Multi source CVE/exploit parser.β27Updated 7 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.β20Updated 3 years ago
- Determine everything you need to know to about a systemβ32Updated 6 years ago
- A single repository for any security tools, scripts, documentation, etc. that I addβ12Updated 8 years ago
- Python-based CLI Password Analyser (Reporting Tool)β33Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan β¦β50Updated 4 years ago
- The goal of this program is to quickly pull and install repos from its listβ40Updated 2 years ago
- Create lists from nmap output.β13Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.β41Updated 2 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.β67Updated 6 years ago
- An automated way to send phishing emails from Google/G-suite.β18Updated 6 years ago
- Passive recon / OSINT automation scriptβ39Updated 6 years ago
- Unofficial WhatCMS API packageβ42Updated 4 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.β23Updated 7 years ago
- Collaborative web dashboard for RedTeam pentestersβ21Updated 5 years ago