evilsocket / pwnagotchi
(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
☆8,264Updated 3 weeks ago
Alternatives and similar repositories for pwnagotchi:
Users that are interested in pwnagotchi are comparing it to the libraries listed below
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆3,978Updated last year
- (⌐■_■) - Raspberry Pi instrumenting Bettercap for Wi-Fi pwning.☆1,657Updated last month
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,514Updated last week
- (⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.☆861Updated 8 months ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,345Updated 6 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,175Updated 8 months ago
- 802.11 Attack Tool☆1,425Updated this week
- ☆449Updated last year
- Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network …☆3,399Updated 2 months ago
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,672Updated last year
- The Official Bash Bunny Payload Repository☆2,749Updated 2 months ago
- Automated Mass Exploiter☆5,109Updated last year
- WiFi Hash Purple Monster, store EAPOL & PMKID packets in an SD CARD using a M5STACK / ESP32 device☆1,002Updated last year
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆14,206Updated 4 months ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,144Updated 2 weeks ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,298Updated 7 months ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,053Updated 8 months ago
- A dope AF repo of all customized plugins & configurations I use as seen on my socials / YouTube. Helpful guides and troubleshooting too.☆482Updated 4 months ago
- E-mails, subdomains and names Harvester - OSINT☆12,454Updated last week
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆6,297Updated 10 months ago
- A collection of captive portals for phishing using a WiFi Pineapple☆1,060Updated 10 months ago
- Wireless keystroke injection attack platform☆2,228Updated last year
- The Official USB Rubber Ducky Payload Repository☆4,705Updated last month
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,222Updated 3 years ago
- User contributed Pwnagotchi plugins.☆324Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,222Updated last week
- WarBerryPi - Tactical Exploitation☆2,223Updated 5 years ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,586Updated 5 months ago
- Playground (and dump) of stuff I make or modify for the Flipper Zero☆15,131Updated this week
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.☆11,509Updated this week