Jam all wifi clients/routers.
☆652Feb 13, 2020Updated 6 years ago
Alternatives and similar repositories for KawaiiDeauther
Users that are interested in KawaiiDeauther are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Easy tools for deauthentication attack wifi☆66Nov 12, 2025Updated 6 months ago
- Deauth a specific WiFi access point or an entire channel☆280Apr 23, 2024Updated 2 years ago
- Fake-AP to perform Evil Twin Attack☆156Jul 29, 2018Updated 7 years ago
- Deauth and Beacon Spammer Script with Multiple functions.☆13Jul 31, 2020Updated 5 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,083Jan 15, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆283May 13, 2018Updated 8 years ago
- Script that generates an Android App to hack SMS through WAN☆410Jan 15, 2025Updated last year
- This script continuously jams all the WiFi networks around you.☆40Jul 12, 2017Updated 8 years ago
- Wireless Jammer to Disconnect Nearby Access-Points and Stations.☆221Jun 10, 2021Updated 4 years ago
- Script to generate a Win32 payload that can take images from the WebCam and send it to the attacker☆106Dec 18, 2018Updated 7 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Tool to check if an app is installed on the target device through a link☆132Mar 13, 2020Updated 6 years ago
- Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix☆1,754Oct 8, 2021Updated 4 years ago
- Continuously jam all wifi clients/routers☆4,249Jul 20, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Simple but sharp ransomware☆38Jul 11, 2020Updated 5 years ago
- Lockphish is a tool for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode[No lon…☆461Nov 5, 2020Updated 5 years ago
- Tool to Jam Full WiFi Network Near-You!☆88Sep 5, 2021Updated 4 years ago
- Jammer 2.4G and 5G AP wifi☆15May 27, 2019Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆445Apr 26, 2022Updated 4 years ago
- Verify if email exists☆415Dec 31, 2021Updated 4 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆147Jul 12, 2020Updated 5 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆58Sep 22, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Wordlist creator written in C to generate all possibilities of passwords☆96Jun 16, 2018Updated 7 years ago
- Bluetooth Honeypot☆272Apr 2, 2026Updated last month
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Powerful framework for rogue access point attack.☆2,451Jan 9, 2024Updated 2 years ago
- Automated WPA/WPA2 PSK attack tool.☆640Aug 21, 2021Updated 4 years ago
- Inject malicious code into *.debs☆286Apr 26, 2022Updated 4 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- ☆12Feb 10, 2019Updated 7 years ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆206Dec 21, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Instagram bruteforce exploit module☆818Mar 29, 2024Updated 2 years ago
- An automated script for deauthentication attack☆276Jun 13, 2020Updated 5 years ago
- Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice…☆155Sep 11, 2021Updated 4 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆564Feb 1, 2020Updated 6 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 3 years ago
- Spam thousands of WiFi access points with custom SSIDs☆528Apr 16, 2024Updated 2 years ago
- Android Keylogger + Reverse Shell☆483Apr 1, 2022Updated 4 years ago