This repo contains various Design of Captive Portals for your Evil Twin/Fake Access Point Attacks.
☆29Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for EvilTwin_AP_CaptivePortal
Users that are interested in EvilTwin_AP_CaptivePortal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WiFi Beacon & Client sniffing pipeline for analysing the movements of Human Traffickers.☆14Oct 9, 2018Updated 7 years ago
- Pulls data from FotMob's API for specific leagues and teams☆19Aug 17, 2025Updated 7 months ago
- The Best Antivirus and Total Protection for Mac! What's the Best Malware Protection? Malware, Spyware, and Adware Protection Antiviru…☆10Aug 1, 2019Updated 6 years ago
- Fake access point using dns spoof and ssl stripping☆21Feb 14, 2018Updated 8 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SpeechJammer inhibits speech on the user, thanks to the Delayed Auditory Feedback effect. To put it briefly, the effect occurs when you h…☆18Nov 7, 2014Updated 11 years ago
- Haisenteck-Flipper-MOD☆14Nov 3, 2023Updated 2 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆19Jun 12, 2020Updated 5 years ago
- ☆16Jan 14, 2023Updated 3 years ago
- DDos and Evil Twin Combo☆47Nov 12, 2021Updated 4 years ago
- Snapchat phishing website☆24Jun 24, 2025Updated 9 months ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- A simple multithreaded SSH credential tester.☆14Jun 6, 2025Updated 9 months ago
- A script that creates a wifi hotspot on kali linux that can view usernames and passwords of ssl logins.☆69Jan 23, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 9 months ago
- Mifare's libraries and sample applications for OMNIKEY readers☆15Apr 26, 2013Updated 12 years ago
- Face Verification API☆11Sep 27, 2021Updated 4 years ago
- Short guide on how to connect to Termux SSH from anywhere while using TailScale as connection link.☆13Aug 30, 2021Updated 4 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- Python Client to LeakIX API☆23Mar 20, 2026Updated last week
- ESP8266 Based WiFi Deauther with more features (like: WebConsole, WebConverter)☆10Jan 3, 2023Updated 3 years ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- generate private key via mnemonics (algorithm match metamask)☆16Aug 18, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Web interface for SMS Tools 3 that should works on OpenWrt.☆11May 23, 2015Updated 10 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆21Aug 11, 2022Updated 3 years ago
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago
- A javascript based botnet/C&C to remotely manage/control browsers.☆24Feb 4, 2022Updated 4 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆15Jul 6, 2025Updated 8 months ago
- Configures your Raspberry Pi as portable WiFi-WiFi Tor proxy.☆21May 20, 2020Updated 5 years ago
- Python Tool to automate WIFI attacks to obtain handshake, PMKID attack, make networks temporarily down, create fake AP's and launch an Ev…☆169Nov 24, 2023Updated 2 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- A simple log aggregation tool☆16Aug 30, 2025Updated 7 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☁️ LeakIX API Client (Unofficial)☆21Nov 16, 2025Updated 4 months ago
- 戰時網路模擬器☆16Nov 4, 2023Updated 2 years ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- Program to anonymize spam texts, to targets, or target lists☆14Sep 2, 2018Updated 7 years ago
- 15,000 most of common SSID names from https://wigle.net/stats#ssidstats☆11Nov 26, 2025Updated 4 months ago
- Evil Twin Attack For ESP8266, Captive Portal + Fake AP + Changeable Index, Micropython☆32Feb 7, 2021Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago