WiPi-Hunter / PiUser
π¨βπ»π΅π»π©βπ» Analyze user behavior against fake access pointsπ‘
β30Updated 6 years ago
Alternatives and similar repositories for PiUser:
Users that are interested in PiUser are comparing it to the libraries listed below
- π΅π»π‘ππAnalyzes all Open Wireless Networks for detect fake access points (Fingerprint)β15Updated 6 years ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ26Updated 6 years ago
- Simple Karma Attackβ67Updated 4 years ago
- π»πππ‘ If an attacker has created a fake enterprise wireless network, my goal is to deceive him.β19Updated 6 years ago
- Malicious Link Blogβ24Updated last year
- Use Tor for anonymous scanning with nmapβ80Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sysβ¦β12Updated 7 years ago
- Passive recon / OSINT automation scriptβ40Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)β51Updated 6 years ago
- A single repository for any security tools, scripts, documentation, etc. that I addβ12Updated 7 years ago
- ANWI - All New Wireless IDSβ27Updated 5 years ago
- Get clients and access points.β49Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its listβ39Updated 2 years ago
- VAPT is a Vulnerability Assessment and Penetration Testing toolkit -- a small collection of some of the common testing tools specificallyβ¦β29Updated last month
- (Unofficial) Python API for cybercrime-tracker.netβ37Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwordsβ51Updated 7 years ago
- Python-based CLI Password Analyser (Reporting Tool)β33Updated 3 years ago
- This tool extract domains from IP address based in the information saved in virustotal.β24Updated 8 years ago
- MS17-010β12Updated 7 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Miningβ31Updated 12 years ago
- Search bing with pythonβ12Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testersβ17Updated 9 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)β36Updated 6 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.β20Updated 3 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploitβ83Updated 6 years ago
- Twintelligence is a free Twitter OSINT toolβ51Updated 4 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend prβ¦β2Updated 5 years ago
- Intelligent threat hunter and phishing serversβ47Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formatsβ43Updated 7 years ago
- my little bucket to store the delusions of grandeur I write in python :Dβ31Updated 10 years ago