π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘
β30Jul 23, 2018Updated 7 years ago
Alternatives and similar repositories for PiUser
Users that are interested in PiUser are comparing it to the libraries listed below
Sorting:
- π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)β16Aug 13, 2018Updated 7 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ24Jun 18, 2018Updated 7 years ago
- π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.β18Feb 10, 2019Updated 7 years ago
- π‘πSearches for wifi-pineapple traces and calculate wireless network security score πβ160May 14, 2020Updated 5 years ago
- π‘ πDetects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detectionβ¦β239Jun 8, 2020Updated 5 years ago
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β256Sep 21, 2018Updated 7 years ago
- Phishing can't get any easier with Tilapiaβ11Jan 2, 2023Updated 3 years ago
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β556Feb 1, 2020Updated 6 years ago
- Simple Karma Attackβ68Oct 1, 2020Updated 5 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.β15Jul 13, 2023Updated 2 years ago
- Tutorial to create a bootable Kali USB drive with persistent storage.β10May 23, 2017Updated 8 years ago
- A small, unfinished utility to browse and download NirSoft programs.β17Jun 14, 2020Updated 5 years ago
- A Serial Communication Extension for Scratchβ11Jun 21, 2021Updated 4 years ago
- A very powerful tool for All kind of MITM attacksβ15Sep 7, 2023Updated 2 years ago
- Tools for inspecting iOS firmware imagesβ17Feb 12, 2019Updated 7 years ago
- Out-of-tree module for GNU Radio containing a complete OFDM implementation including GUI for reasearch and teachingβ16Mar 4, 2018Updated 8 years ago
- Published Articles of the Past (trying to be as complete as possible)β15Jan 20, 2021Updated 5 years ago
- A CMS for reading and writing stories in a online magazine format.β18Jul 4, 2019Updated 6 years ago
- Honeybadger Red Editionβ13Sep 13, 2017Updated 8 years ago
- BadProxy is the tool which show a man in middle attack over the internet over the proxyβ10Mar 31, 2018Updated 7 years ago
- log file scrubberβ15Jul 27, 2018Updated 7 years ago
- Software, firmware and hardware designs for Ubertoothβ19Aug 30, 2015Updated 10 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.β16Aug 28, 2015Updated 10 years ago
- A simple bash based metasploit automation tool!β125Feb 16, 2023Updated 3 years ago
- Mr.Brown is a responsive Jekyll themeβ22May 6, 2017Updated 8 years ago
- Version Releases of Splinter the RAT @Carpenter1010β32Nov 12, 2014Updated 11 years ago
- Latest Nessus Vulnerability Scannerβ16Dec 15, 2020Updated 5 years ago
- Probe Request sniffer + Wigleβ80Feb 17, 2020Updated 6 years ago
- A commercial grade threat intelligence feed thats validated and updated every half hour.β19Mar 24, 2023Updated 2 years ago
- This is a command line interface version of the Fivem Script Converterβ11Aug 30, 2022Updated 3 years ago
- π A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.β23Feb 23, 2026Updated last week
- Interactive Arts 1; Installation & Immersive Environments - course repo. University of Montana, School of Media Artsβ14Aug 24, 2020Updated 5 years ago
- β51Feb 5, 2014Updated 12 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploitβ25Sep 4, 2018Updated 7 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the stβ¦β27Apr 20, 2014Updated 11 years ago
- Python Pentest Toolsβ22Dec 22, 2025Updated 2 months ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB β¦β22Feb 6, 2020Updated 6 years ago
- PoC Android smart phone botnetβ79Aug 4, 2012Updated 13 years ago
- β28Apr 18, 2016Updated 9 years ago