d4rkcat / killosxLinks
use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range
☆21Updated 10 years ago
Alternatives and similar repositories for killosx
Users that are interested in killosx are comparing it to the libraries listed below
Sorting:
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Wireless discovery and exploitation framework written in Python☆18Updated 14 years ago
- Automated man-in-the-middle attack tool.☆51Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Wi-Fi Backdoors☆39Updated 9 years ago
- Hacking environment installation scripts for OS X☆26Updated 3 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 8 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆40Updated 11 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- ☆12Updated 10 years ago
- Password cracking utility☆53Updated 4 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 10 years ago
- A python script for obfuscating wireless networks☆78Updated 8 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆29Updated 9 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 8 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆31Updated 10 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- autoscan - automatic fingerprint of visited networks☆10Updated 11 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆22Updated 3 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 13 years ago
- Multi protocol sniffer, created for ChaosConstruction conference HackSpace☆9Updated 12 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago