aopp / android_platform
☆83Updated 7 years ago
Alternatives and similar repositories for android_platform:
Users that are interested in android_platform are comparing it to the libraries listed below
- ☆20Updated 6 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- ☆92Updated 6 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Detect and prevent KRACK attacks in your network☆181Updated 7 years ago
- The WiFi Pineapple Wiki☆239Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆122Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 3 months ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Reliable Teensy Penetration Testing Payload☆177Updated 12 years ago
- Framework for Man-In-The-Middle attacks☆185Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 8 years ago
- Web Sight Docker Deployment☆124Updated 7 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆139Updated 6 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆191Updated 8 years ago
- Bash script to install Honeypot projects ona Raspbian System☆26Updated 9 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆56Updated 9 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 5 years ago
- Capturing, analysing and responding to cyber attacks☆170Updated 4 months ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆309Updated 5 years ago
- Fetch, install and search exploit archives from exploit sites.☆111Updated last year
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆222Updated 6 years ago
- Tools for 802.11 information gathering.☆118Updated 2 years ago
- A webshell framework for penetration testers.☆296Updated 9 months ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 7 years ago
- ☆219Updated 7 months ago
- Common Findings Database☆100Updated 5 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago