A script that creates a wifi hotspot on kali linux that can view usernames and passwords of ssl logins.
☆69Jan 23, 2016Updated 10 years ago
Alternatives and similar repositories for Kali-MiTM-Evil-twin
Users that are interested in Kali-MiTM-Evil-twin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kali Linux - An Ethical Hacker's Cookbook, published by Packt☆52Jan 18, 2023Updated 3 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆32Aug 2, 2013Updated 12 years ago
- Bypass Factory Reset Protection on any Samsung Galaxy S8 SM-G950* model on Android 7.0 Nougat or later.☆37Jun 1, 2019Updated 6 years ago
- A collection of scripts to run on a fresh install of kali linux☆36Feb 17, 2018Updated 8 years ago
- Kali Live Build Scripts☆43Aug 20, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repo contains various Design of Captive Portals for your Evil Twin/Fake Access Point Attacks.☆29Dec 4, 2020Updated 5 years ago
- Tools Hack facebook 100% work☆14May 1, 2021Updated 5 years ago
- appland client☆19Jul 30, 2015Updated 10 years ago
- BitRat 1.39 Cracked & Offline Builder☆11Mar 5, 2022Updated 4 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆124Apr 13, 2019Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- A Jupyter Notebook Program To Visualize Your WiGLE Wardriving Data☆23Oct 8, 2021Updated 4 years ago
- PowerShell version of Fail2Ban☆14Oct 10, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Shellphish is created by TheLinuxChoice but after the repository deleted we recreate this. To know how to use shellphish visit our websit…☆98Jul 5, 2020Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Apr 1, 2026Updated last month
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- Adversaries may introduce computer accessories, networking hardware, or other computing devices into a system or network that can be used…☆13Aug 27, 2024Updated last year
- This is very usefull bluetooth jammer or doser tool in kali or parrot linux...☆166May 12, 2019Updated 7 years ago
- Magspoof implementation via ESP8266 (ledunia)☆21Jul 27, 2018Updated 7 years ago
- Kali Linux advanced setup☆148Feb 28, 2026Updated 2 months ago
- Just some flipper zero scripts☆15Sep 3, 2022Updated 3 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Refluxion -- MITM WPA attacks tool☆40Jul 18, 2020Updated 5 years ago
- ☆10Mar 18, 2023Updated 3 years ago
- Automate your Kali Linux Penetration Testing toolchain☆31May 24, 2015Updated 10 years ago
- 50+ Hacking Tools Collection☆17Sep 13, 2017Updated 8 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 4 years ago
- This is a simple but very powerful sms spamming program that is coded in visual basic. I could not find a program for my needs with no vi…☆12May 24, 2013Updated 12 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆15Mar 21, 2018Updated 8 years ago
- A handful of simple Thunderbird addons that I've developed and found helpful.☆12Nov 7, 2022Updated 3 years ago
- Small and stupid DHCP client.☆10May 28, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Two-factor authentication on the command line using the OS keychain☆13Aug 26, 2019Updated 6 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- Barebones RAT which provides a shell over TLS☆12Apr 10, 2021Updated 5 years ago
- ☆13Feb 16, 2016Updated 10 years ago
- Icons by mattahan☆15Mar 16, 2023Updated 3 years ago
- You can track location & service provider details of any phone number by using this project.☆11Feb 19, 2022Updated 4 years ago
- This repo is for purposes use only do NOT use any files without permission.☆18Jan 12, 2023Updated 3 years ago