cyclo-techtwister / BRUTEITLinks
A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng
☆14Updated 6 years ago
Alternatives and similar repositories for BRUTEIT
Users that are interested in BRUTEIT are comparing it to the libraries listed below
Sorting:
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆17Updated 10 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Updated 6 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆35Updated 8 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- Automated Mass Exploiter☆12Updated 6 years ago
- Automatically exported from code.google.com/p/auto-reaver☆11Updated 10 years ago
- hackpack to go with lazykali on menu application Kali Linux☆29Updated 10 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆33Updated 8 years ago
- Script to check Kali Linux configs☆25Updated 6 years ago
- A collection of scripts to run on a fresh install of kali linux☆37Updated 7 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆22Updated 3 years ago
- ☆10Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- wifi attacks suite☆59Updated 4 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago
- ☆24Updated 7 years ago
- ARP spoof then session jack within your browser☆29Updated 11 years ago
- Refluxion -- MITM WPA attacks tool☆36Updated 4 years ago
- Evil Twin Attack Bash script☆13Updated 9 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 11 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆38Updated 6 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- Just the filesystem builder☆9Updated 6 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆16Updated 11 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Sniffs sensitive data from interface or pcap☆15Updated 10 years ago
- This project is aimed to automate hacking by a USB. Currently for Windows, different platforms coming soon☆12Updated 5 years ago