Rogue Access Point Detector
☆37Sep 2, 2024Updated last year
Alternatives and similar repositories for RogueAP-Detector
Users that are interested in RogueAP-Detector are comparing it to the libraries listed below
Sorting:
- Bat file to collect software and hardware system information without admin permissions.☆14Feb 17, 2022Updated 4 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Nov 20, 2021Updated 4 years ago
- CIPSEC SDR Jammer Detector☆17Jun 11, 2019Updated 6 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 3 months ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy☆29Jun 27, 2020Updated 5 years ago
- Some Malduino ducky scripts☆26May 22, 2017Updated 8 years ago
- ☆51Jun 28, 2025Updated 8 months ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Detect jamming on ISM bands using an RTLSDR dongle and a Raspberry Pi or laptop PC☆36Jul 15, 2017Updated 8 years ago
- A fake login page for use in a phishing attack☆35Mar 21, 2017Updated 8 years ago
- ☆35Jul 6, 2024Updated last year
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- Source Code for 'Introducing Blockchain with Java' by Spiro Buzharovski☆12Feb 24, 2022Updated 4 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- Red Login: SSH Brute-force Tools☆106Jun 28, 2018Updated 7 years ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- ☆35Sep 13, 2022Updated 3 years ago
- hostapd-mana - build-files, and installation-files for OpenWRT☆33Nov 20, 2021Updated 4 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Sep 21, 2018Updated 7 years ago
- Everything about Azure Virtual Desktop!☆38Apr 15, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Feb 3, 2025Updated last year
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Use this tool to convert a standard Beat Saber level into a 360 degree one!☆10Dec 8, 2022Updated 3 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- PillDucky is similar to "Hak5's Rubber Ducky" but for STM32 boards.☆15Jul 27, 2021Updated 4 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- TV transmitter and receiver through RTL-SDR, for educational purposes☆11Oct 27, 2017Updated 8 years ago