adelashraf / cenariusLinks
cenarius tool for crack Wi-Fi , crack wpa-psk , crack wpa2-psk , crack wep , crack wps pin and crack hidden AP . cenarius psk crack
☆30Updated 9 years ago
Alternatives and similar repositories for cenarius
Users that are interested in cenarius are comparing it to the libraries listed below
Sorting:
- Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks☆59Updated 7 years ago
- Refluxion -- MITM WPA attacks tool☆39Updated 5 years ago
- GSM hacking tools and scripts☆56Updated 5 years ago
- A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng☆14Updated 6 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Updated 8 years ago
- simple script to pwn android phone with physical access☆26Updated 6 years ago
- Tools and scripts dedicated to Android application security☆51Updated 4 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 7 years ago
- Android 802.11 pentesting tool☆94Updated 11 years ago
- Note:- Run this Script in root user.☆16Updated 8 years ago
- A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.☆56Updated 9 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆30Updated 6 years ago
- SIP hacking tools and scripts☆23Updated 5 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Updated 10 years ago
- Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android☆108Updated 5 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 9 years ago
- This project is aimed to automate hacking by a USB. Currently for Windows, different platforms coming soon☆12Updated 5 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 7 years ago
- bluesnarfing proof-of-concept tool.☆56Updated 9 years ago
- Automated Mass Exploiter☆11Updated 6 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆17Updated 11 years ago
- Mobile phone PWN tools and scripts☆15Updated 5 years ago
- Generate HID attack strings for Kali Nethunter☆12Updated 10 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 10 years ago
- wifi attacks suite☆60Updated 5 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Updated 8 years ago
- Automatically exported from code.google.com/p/auto-reaver☆12Updated 10 years ago