aryanrtm / KawaiiDeautherView external linksLinks
Jam all wifi clients/routers.
☆632Feb 13, 2020Updated 6 years ago
Alternatives and similar repositories for KawaiiDeauther
Users that are interested in KawaiiDeauther are comparing it to the libraries listed below
Sorting:
- Easy tools for deauthentication attack wifi☆61Nov 12, 2025Updated 3 months ago
- Deauth a specific WiFi access point or an entire channel☆276Apr 23, 2024Updated last year
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,067Jan 15, 2021Updated 5 years ago
- Fake-AP to perform Evil Twin Attack☆143Jul 29, 2018Updated 7 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆278May 13, 2018Updated 7 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Tool to check if an app is installed on the target device through a link☆123Mar 13, 2020Updated 5 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆144Jul 12, 2020Updated 5 years ago
- Wireless Jammer to Disconnect Nearby Access-Points and Stations.☆216Jun 10, 2021Updated 4 years ago
- Script that generates an Android App to hack SMS through WAN☆392Jan 15, 2025Updated last year
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- python hash cracker☆52Nov 18, 2024Updated last year
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆57Sep 22, 2022Updated 3 years ago
- Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix☆1,690Oct 8, 2021Updated 4 years ago
- Inject malicious code into *.debs☆283Apr 26, 2022Updated 3 years ago
- Automated WPA/WPA2 PSK attack tool.☆623Aug 21, 2021Updated 4 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆438Apr 26, 2022Updated 3 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆91Jun 16, 2018Updated 7 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆557Feb 1, 2020Updated 6 years ago
- This script continuously jams all the WiFi networks around you.☆40Jul 12, 2017Updated 8 years ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆649Oct 15, 2022Updated 3 years ago
- Lockphish is a tool for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode[No lon…☆435Nov 5, 2020Updated 5 years ago
- Powerful framework for rogue access point attack.☆2,377Jan 9, 2024Updated 2 years ago
- Verify if email exists☆409Dec 31, 2021Updated 4 years ago
- Script to generate a Win32 payload that can take images from the WebCam and send it to the attacker☆98Dec 18, 2018Updated 7 years ago
- Spam thousands of WiFi access points with custom SSIDs☆518Apr 16, 2024Updated last year
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- [SUSPENDED PROJECT] aSYNcrone is a SYN Flood DDoS Tool! It has developed for educational purposes and gain knowledge on socket programmin…☆281May 11, 2024Updated last year
- USBNinja steals all Wifi SSID's and passwords that a computer has been connected to and sends them to a mail by choice. Works on Windows …☆21Nov 26, 2019Updated 6 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Continuously jam all wifi clients/routers☆4,214Jul 20, 2024Updated last year
- Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice…☆153Sep 11, 2021Updated 4 years ago
- Simple Remote Access Trojan Tool☆233Feb 18, 2022Updated 3 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 6 months ago
- Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2)☆2,695Jan 25, 2024Updated 2 years ago