Rogue Access Point Detector
☆37Sep 2, 2024Updated last year
Alternatives and similar repositories for RogueAP-Detector
Users that are interested in RogueAP-Detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detect and alert when Rogue AP and Deauth attacks occur☆14May 16, 2019Updated 6 years ago
- ☆15Jan 21, 2020Updated 6 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Bat file to collect software and hardware system information without admin permissions.☆14Feb 17, 2022Updated 4 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆17Jun 14, 2020Updated 5 years ago
- Great quotes from the never-ending cryptowars☆11Oct 19, 2021Updated 4 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- Send and receive files or stream data encrypted over a local network.☆14Mar 6, 2023Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Elastic SIEM template for docker☆19Oct 6, 2021Updated 4 years ago
- 📶 A Bash script to automate the continuous circular deauthentication of all the wifi networks in your reach☆36Feb 11, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- VoIPmonitor sniffer sources☆20Nov 14, 2019Updated 6 years ago
- CIPSEC SDR Jammer Detector☆17Jun 11, 2019Updated 6 years ago
- ☆13Jul 3, 2021Updated 4 years ago
- This tool helps #blueteams detect bad actors who may be port scanning the network, and allows #redteams to practice honeypot evasion.☆11Oct 20, 2020Updated 5 years ago
- A pwnagotchi plugin that sends status messages encapsulated inside a valid beacon frame. They are easy to process from an Android/iOS app…☆27Nov 15, 2019Updated 6 years ago
- NCC Group Ransomware Simulator☆69Jul 7, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Red Login: SSH Brute-force Tools☆106Jun 28, 2018Updated 7 years ago
- USB MitM Wifi keylogger with keyboard and mouse injection capabilities☆63Jan 8, 2020Updated 6 years ago
- Create wifi access points on the go (karma-like), simulate internet connectivity, gather whatever is sent ;)☆11Aug 7, 2025Updated 8 months ago
- HWR0's Shield Designs for the MorphESP 240 by @ccadic☆13Oct 7, 2021Updated 4 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Steal users password with a fake sudo function.☆44Feb 29, 2024Updated 2 years ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- ☆16Dec 7, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Dec 27, 2018Updated 7 years ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Sep 21, 2018Updated 7 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- Generate valid looking random MAC address☆17Feb 13, 2014Updated 12 years ago
- Collection of linux sysadmin/devop interview questions☆18Aug 21, 2015Updated 10 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago