calebmadrigal / trackerjacker
Like nmap for mapping wifi networks you're not connected to, plus device tracking
β2,621Updated 8 months ago
Related projects: β
- π‘ A python program to create a fake AP and sniff data.β1,654Updated 4 years ago
- SSH man-in-the-middle toolβ1,609Updated 3 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanningβ3,067Updated 3 months ago
- Automated Mass Exploiterβ5,012Updated last year
- Know the dangers of credential reuse attacks.β2,002Updated 5 years ago
- WarBerryPi - Tactical Exploitationβ2,218Updated 4 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3β3,078Updated 4 years ago
- A framework for wireless pentesting.β1,188Updated 3 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords arenβ¦β8,613Updated 11 months ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.β1,093Updated 5 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.β1,565Updated last year
- Tool to scan for secret files on HTTP serversβ2,052Updated last month
- XRay is a tool for recon, mapping and OSINT gathering from public networks.β2,188Updated 2 months ago
- Bluetooth Low Energy Swiss-army knifeβ1,885Updated last month
- People tracker on the Internet: OSINT analysis and research tool by Jose Pinoβ8,053Updated 2 months ago
- β901Updated this week
- Cameradar hacks its way into RTSP videosurveillance camerasβ4,040Updated 2 months ago
- Analyze the security of any domain by finding all the information possible. Made in python.β1,843Updated last year
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the rβ¦β3,000Updated 4 years ago
- Continuously jam all wifi clients/routersβ3,954Updated last month
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendorsβ¦β1,181Updated 5 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Sβ¦β1,529Updated 3 years ago
- Exploitation Framework for Embedded Devicesβ12,116Updated 3 months ago
- This program show you IMSI numbers of cellphones around you.β3,154Updated 2 months ago
- β3,319Updated 4 months ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons coβ¦β6,218Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLYβ3,095Updated 2 years ago
- Build interactive map of cameras from Shodanβ1,242Updated 4 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercapβ2,501Updated 6 years ago
- Striker is an offensive information and vulnerability scanner.β2,211Updated last year