WiPi-Hunter / PiUser
π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘
β30Updated 6 years ago
Alternatives and similar repositories for PiUser:
Users that are interested in PiUser are comparing it to the libraries listed below
- π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)β15Updated 6 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ26Updated 6 years ago
- π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.β19Updated 6 years ago
- Simple Karma Attackβ67Updated 4 years ago
- β19Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testersβ17Updated 9 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Miningβ31Updated 12 years ago
- A few transforms and a machine for parsing Nmap XML resultsβ37Updated 8 years ago
- Official Black Hat Arsenal Security Tools Repositoryβ21Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwordsβ51Updated 7 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.β20Updated 3 years ago
- Create lists from nmap output.β13Updated 4 years ago
- Scrape pastes from pastebin and archive them for reviewβ16Updated 5 years ago
- recon-ng Maltego local transform packβ39Updated 11 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)β51Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)β36Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you providedβ33Updated 3 years ago
- GUI Tool to generate threat intelligence information in various formatsβ43Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I addβ12Updated 7 years ago
- Passive recon / OSINT automation scriptβ40Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan β¦β50Updated 4 years ago
- Shodan.io Command Line Interfaceβ44Updated 3 years ago
- Multi source CVE/exploit parser.β27Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploitβ83Updated 6 years ago
- Intelligent threat hunter and phishing serversβ47Updated 6 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serveβ¦β36Updated 2 years ago
- One-off scriptsβ49Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.β22Updated 7 years ago
- Unofficial WhatCMS API packageβ42Updated 3 years ago
- A swiss army knife for pentesting Windows/Active Directory environmentsβ13Updated 6 years ago