aopp / android_platformLinks
☆82Updated 8 years ago
Alternatives and similar repositories for android_platform
Users that are interested in android_platform are comparing it to the libraries listed below
Sorting:
- ☆20Updated 6 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 9 years ago
- Tools for 802.11 information gathering.☆119Updated 3 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆56Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- ☆155Updated 7 years ago
- ☆32Updated 10 years ago
- Fetch, install and search exploit archives from exploit sites.☆114Updated last year
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆91Updated 6 years ago
- Web Sight Docker Deployment☆123Updated 7 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 9 years ago
- Reliable Teensy Penetration Testing Payload☆179Updated 12 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- Stargate☆94Updated 8 years ago
- ☆92Updated 6 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 7 years ago
- Veil Catapult is no longer supported☆76Updated 9 years ago
- Mobile UI for kismet☆179Updated 8 months ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆96Updated 8 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆140Updated 6 years ago
- Sensor software☆68Updated 3 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year