A script that creates a wifi hotspot on kali linux that can view usernames and passwords of ssl logins.
☆69Jan 23, 2016Updated 10 years ago
Alternatives and similar repositories for Kali-MiTM-Evil-twin
Users that are interested in Kali-MiTM-Evil-twin are comparing it to the libraries listed below
Sorting:
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Aug 2, 2013Updated 12 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Feb 15, 2016Updated 10 years ago
- Hacking Tools☆51Aug 14, 2018Updated 7 years ago
- Bypass Factory Reset Protection on any Samsung Galaxy S8 SM-G950* model on Android 7.0 Nougat or later.☆34Jun 1, 2019Updated 6 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 8 months ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- This repo contains various Design of Captive Portals for your Evil Twin/Fake Access Point Attacks.☆28Dec 4, 2020Updated 5 years ago
- This is a simple but very powerful sms spamming program that is coded in visual basic. I could not find a program for my needs with no vi…☆12May 24, 2013Updated 12 years ago
- The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.…☆135May 25, 2020Updated 5 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 6 years ago
- Install hamachi on your raspberry pi☆16Jul 26, 2025Updated 7 months ago
- A collection of scripts to run on a fresh install of kali linux☆36Feb 17, 2018Updated 8 years ago
- appland client☆19Jul 30, 2015Updated 10 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- Script for deploying CTF tools (Linux) tested on Kali 2☆12Feb 15, 2021Updated 5 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆18Sep 27, 2018Updated 7 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆21Oct 8, 2021Updated 4 years ago
- Sniff wifi probes from nearby devices (passive monitoring only) and logs to a Django App/DB (with GUI) and optionally can log all probes …☆33Feb 10, 2026Updated 3 weeks ago
- Hitman - A tool for reliable TCP/IP communication and detection in the presence of on-path connection reset censorship technologies and f…☆17Dec 23, 2019Updated 6 years ago
- A tool based on libnfc that executes an active authentication and encrypted communication with a CryptoRF tag☆22Sep 1, 2020Updated 5 years ago
- DDos and Evil Twin Combo☆47Nov 12, 2021Updated 4 years ago
- Kali Linux advanced setup☆139Feb 28, 2026Updated last week
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Dark tool for Termux :v☆20Feb 4, 2022Updated 4 years ago
- Magspoof implementation via ESP8266 (ledunia)☆21Jul 27, 2018Updated 7 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Kali Live Build Scripts☆43Aug 20, 2021Updated 4 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Jun 6, 2018Updated 7 years ago
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Mar 22, 2021Updated 4 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- Social engineering tool for human hacking☆125Nov 7, 2016Updated 9 years ago
- ☆19Sep 3, 2018Updated 7 years ago
- w3af packaging for Kali distribution☆26Nov 29, 2015Updated 10 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago