bettercap / uiLinks
bettercap's web UI
☆349Updated 3 months ago
Alternatives and similar repositories for ui
Users that are interested in ui are comparing it to the libraries listed below
Sorting:
- caplets and proxy modules.☆511Updated 8 months ago
- An all-in-one WPA/WPS toolkit☆426Updated 2 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆552Updated 5 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆183Updated 4 years ago
- coWPAtty: WPA2-PSK Cracking☆227Updated 6 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆360Updated 3 months ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Updated 10 months ago
- Encoding Tools for Rubber Ducky☆441Updated last year
- Distributed WPA PSK auditor☆342Updated 5 months ago
- SensePost's modified hostapd for wifi attacks.☆591Updated last year
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆263Updated 2 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆297Updated last year
- Bluetooth Honeypot☆262Updated 4 years ago
- Evil Portal for the Wifi Pineapple Nano and Wifi Pineapple Tetra☆130Updated 5 years ago
- Modified hostapd to facilitate AP impersonation attacks☆517Updated 7 years ago
- Python port of infamous duckencoder for RubberDucky☆143Updated 2 years ago
- Toolkit for Playing with Wi-Fi Probe Requests☆270Updated last week
- Mobile UI for kismet☆183Updated last year
- Automated DeAuth attack☆317Updated last year
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 7 years ago
- network reconnaissance toolkit☆432Updated 6 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆417Updated 4 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆469Updated 6 years ago
- Linux Internet Connection Sharing script for 6th generation WiFi Pineapples☆144Updated 6 years ago
- Capture handshakes of nearby WiFi networks automatically☆774Updated 4 years ago
- Hashcat web interface☆321Updated 8 months ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Updated 7 years ago
- JackIt - Exploit Code for Mousejack☆877Updated 5 years ago
- USB keystroke injector controlled by smartphone.☆231Updated 3 months ago
- An automated Wireless RogueAP MITM attack framework.☆187Updated 6 years ago