aress31 / wirespy
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
☆610Updated 2 years ago
Alternatives and similar repositories for wirespy:
Users that are interested in wirespy are comparing it to the libraries listed below
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆988Updated 4 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆414Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆729Updated 4 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆426Updated 6 years ago
- an easy pentesting tool.☆475Updated 2 years ago
- Hakku Framework penetration testing☆326Updated 3 years ago
- Hacking systems with the automation of PasteJacking attacks.☆392Updated 3 months ago
- Community-built scenarios for Wifiphisher☆346Updated 3 years ago
- BlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only☆506Updated last year
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆252Updated 6 years ago
- An app to remote control SocialFish.☆489Updated last year
- Automated tool for WiFi hacking.☆710Updated 3 years ago
- A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner☆683Updated last year
- ☆969Updated 2 years ago
- Websploit is a high level MITM framework☆1,161Updated last year
- Wireless Jammer to Disconnect Nearby Access-Points and Stations.☆200Updated 3 years ago
- Multiplatform payload dropper☆260Updated 3 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆898Updated 5 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆454Updated 6 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,035Updated 2 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,160Updated 2 years ago
- Verify if email exists☆365Updated 3 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆291Updated 5 months ago
- Automatically exported from code.google.com/p/ghost-phisher☆350Updated 4 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,128Updated 4 years ago
- Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im stil…☆546Updated 3 years ago
- The New Hacking Framework☆691Updated 3 years ago
- Spoof who an SMS is from using an SMS API☆378Updated 2 years ago
- Python wordlist generator☆166Updated 2 years ago
- Brute Force For Facebook,Instagram & Twitter☆475Updated 4 years ago