cloudshark / pi-in-the-middleLinks
Capture traffic, export TLS keys, upload to CloudShark
☆68Updated 6 years ago
Alternatives and similar repositories for pi-in-the-middle
Users that are interested in pi-in-the-middle are comparing it to the libraries listed below
Sorting:
- Selective wifi jammer - control who can connect where☆46Updated 7 years ago
- Bluetooth Network Access Point☆166Updated 8 years ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- Notifies You of Chosen People in Your Vicinity via Their Wifi Probe Requests From an Simple Web GUI☆69Updated 4 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Updated 5 years ago
- The generates a report for SSIDs, exports to PDF and CSV☆22Updated 3 years ago
- Tor based Raspberry π hotspot☆120Updated 4 years ago
- RasPwn OS☆59Updated 8 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆19Updated 4 years ago
- Transparent network tap☆118Updated 9 years ago
- A command line tool for querying wigle.net and displaying results on Google Maps.☆40Updated last year
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆25Updated 6 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆34Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- A collection of various scripts I've written through the years☆67Updated 2 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆32Updated 6 years ago
- A highly configurable Linux Bluetooth scanner with optional web interface.☆125Updated 5 years ago
- Bluetooth wardriving utility☆102Updated last year
- Mobile UI for kismet☆179Updated 8 months ago
- Detect and alert when Rogue AP and Deauth attacks occur☆13Updated 6 years ago
- Tool to create large numbers of phantom Bluetooth devices.☆30Updated 12 years ago
- Linux 802.11 channel hopping utility.☆20Updated 7 years ago
- Docker images for learning wifi hacking☆67Updated 6 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Apple BLE research☆30Updated 5 years ago
- Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps an…☆50Updated 6 years ago
- a collection of writeups and tools related to ~embedded device ~hacking☆141Updated 7 years ago
- Wordlists are generated by permutations of a list of keywords. You can configure (connectors, abbreviations, reverse, replacements ...) t…☆38Updated 6 years ago