WiPi-Hunter / PiUserLinks
π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘
β30Updated 6 years ago
Alternatives and similar repositories for PiUser
Users that are interested in PiUser are comparing it to the libraries listed below
Sorting:
- π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)β15Updated 6 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ26Updated 6 years ago
- π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.β19Updated 6 years ago
- The goal of this program is to quickly pull and install repos from its listβ40Updated 2 years ago
- Simple Karma Attackβ69Updated 4 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.β25Updated 7 years ago
- Create lists from nmap output.β13Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)β36Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploitβ84Updated 6 years ago
- Python - Metasploit-Framework Database Managementβ15Updated 4 years ago
- Intelligent threat hunter and phishing serversβ47Updated 6 years ago
- Tool to identify all domains contained in an IP anonymouslyβ15Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testersβ17Updated 9 years ago
- Determine everything you need to know to about a systemβ32Updated 6 years ago
- Scrape pastes from pastebin and archive them for reviewβ16Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwordsβ51Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you providedβ33Updated 3 years ago
- Multi source CVE/exploit parser.β27Updated 7 years ago
- Script is a proof of concept how to control your machine by using social media sites.β21Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.β24Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.β23Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sysβ¦β12Updated 8 years ago
- PHP Phishing Frameworkβ28Updated 11 years ago
- Shodan.io Command Line Interfaceβ44Updated 3 years ago
- Enterprise WPA Wireless Tool Suiteβ84Updated 2 years ago
- Specify targets and run sets of tools against themβ11Updated 10 years ago
- Python-based CLI Password Analyser (Reporting Tool)β33Updated 3 years ago
- Automatically get internetz from access points that have MAC based filtering enabledβ55Updated 7 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.β13Updated 6 years ago
- Twintelligence is a free Twitter OSINT toolβ52Updated 4 years ago