This repo contains various Design of Captive Portals for your Evil Twin/Fake Access Point Attacks.
☆29Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for EvilTwin_AP_CaptivePortal
Users that are interested in EvilTwin_AP_CaptivePortal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WiFi Beacon & Client sniffing pipeline for analysing the movements of Human Traffickers.☆14Oct 9, 2018Updated 7 years ago
- Pulls data from FotMob's API for specific leagues and teams☆19Aug 17, 2025Updated 8 months ago
- Fake access point using dns spoof and ssl stripping☆21Feb 14, 2018Updated 8 years ago
- The Best Antivirus and Total Protection for Mac! What's the Best Malware Protection? Malware, Spyware, and Adware Protection Antiviru…☆10Aug 1, 2019Updated 6 years ago
- Raspberry Pi WiFi Evil Twin Captive Portal☆100Oct 12, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SpeechJammer inhibits speech on the user, thanks to the Delayed Auditory Feedback effect. To put it briefly, the effect occurs when you h…☆18Nov 7, 2014Updated 11 years ago
- Haisenteck-Flipper-MOD☆14Nov 3, 2023Updated 2 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆58Sep 22, 2022Updated 3 years ago
- ☆15Jan 14, 2023Updated 3 years ago
- DDos and Evil Twin Combo☆48Nov 12, 2021Updated 4 years ago
- Fork of XCT clean kali install with sprinkling of theGuildHall pwnbox implementation and some love <3.☆11Aug 16, 2023Updated 2 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Browser streaming MITM proxy☆30Sep 5, 2023Updated 2 years ago
- A command-line tool to tidy-up Objective-C interfaces generated with class dump tools.☆12Feb 23, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Mifare's libraries and sample applications for OMNIKEY readers☆15Apr 26, 2013Updated 12 years ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆15Aug 18, 2024Updated last year
- Automate creation of fake access points for MITM attacks with this bash script. Ideal for those who need to perform penetration testing o…☆26Jul 2, 2024Updated last year
- Short guide on how to connect to Termux SSH from anywhere while using TailScale as connection link.☆13Aug 30, 2021Updated 4 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- generate private key via mnemonics (algorithm match metamask)☆16Aug 18, 2021Updated 4 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆21Aug 11, 2022Updated 3 years ago
- xmrig挖矿病毒样本☆24Nov 10, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago
- A javascript based botnet/C&C to remotely manage/control browsers.☆24Feb 4, 2022Updated 4 years ago
- Proof-of-concept exploit for GOG Galaxy Client vulnerabilities☆13Aug 26, 2020Updated 5 years ago
- Python Client to LeakIX API☆25Mar 20, 2026Updated 3 weeks ago
- Configures your Raspberry Pi as portable WiFi-WiFi Tor proxy.☆22May 20, 2020Updated 5 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- Check Ethereum and 67 other EVM chain balances of wallet addresses using debank API. Multithreaded and super fast. Supports address, priv…☆18Dec 10, 2023Updated 2 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- ☁️ LeakIX API Client (Unofficial)☆21Nov 16, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A simple log aggregation tool☆16Aug 30, 2025Updated 7 months ago
- 戰時網路模擬器☆16Nov 4, 2023Updated 2 years ago
- FlipperZero Database for german signals☆12May 3, 2023Updated 2 years ago
- Program to anonymize spam texts, to targets, or target lists☆15Sep 2, 2018Updated 7 years ago
- 15,000 most of common SSID names from https://wigle.net/stats#ssidstats☆11Nov 26, 2025Updated 4 months ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- ☆12May 13, 2024Updated last year