flankerhqd / wifimonsterView external linksLinks
Wifi sniffing and hijacking tool
☆81Sep 25, 2014Updated 11 years ago
Alternatives and similar repositories for wifimonster
Users that are interested in wifimonster are comparing it to the libraries listed below
Sorting:
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆32Apr 8, 2019Updated 6 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 3 years ago
- Tiny WiFi sniffer with Scapy for MAC OS X☆22Oct 18, 2014Updated 11 years ago
- Wi-Fi Backdoors☆42Aug 5, 2015Updated 10 years ago
- Display the SSID probes of nearby wireless devices. Useful in wireless security awareness projects.☆25Nov 19, 2017Updated 8 years ago
- A quick and dirty utility to capture and store WiFi probes.☆18Dec 14, 2013Updated 12 years ago
- A Cracking Tool for open Wifis with login pages☆22May 2, 2013Updated 12 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Tools for working with the 802.11B scrambler when writing Packet-in-Packet exploits.☆20Sep 15, 2013Updated 12 years ago
- This is a fast script to deauth all, a network or target with a built in oui lookup tool.☆19Jul 8, 2018Updated 7 years ago
- WiFi-Jammer/DoS toolset☆61Jun 8, 2020Updated 5 years ago
- Python Wi-Fi Positioning System - Wi-Fi geolocation script using the Google Geolocation API☆57Mar 10, 2018Updated 7 years ago
- Wifi/Ethernet network session hijacker based on Scapy☆21Mar 14, 2013Updated 12 years ago
- A Simple Mobile App to track the gps locations of Registered member and send the data to Remote Server☆15May 31, 2015Updated 10 years ago
- Scan for giveaways of fake Mobile Base Stations to detect them.☆21May 19, 2016Updated 9 years ago
- A lightweight Wi-Fi auto deauthentication attack tool (libtins/C++)☆37Oct 18, 2016Updated 9 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆42Jun 6, 2014Updated 11 years ago
- WiFi Jamming tool☆104Oct 30, 2013Updated 12 years ago
- Sniff Wifi traffic, log device addresses.☆114Sep 21, 2021Updated 4 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆22May 17, 2018Updated 7 years ago
- 📶 A Bash script to automate the continuous circular deauthentication of all the wifi networks in your reach☆36Feb 11, 2019Updated 7 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆11Feb 2, 2018Updated 8 years ago
- All transmit and receive files for the HackRF and HackRF Blue☆23Dec 7, 2015Updated 10 years ago
- Wireless Attacks in Python (Based on Blog Series)☆92Nov 16, 2013Updated 12 years ago
- An arduino based gps tracker that transmits data over a GSM shield☆16Jan 13, 2014Updated 12 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Python automated wifi jammer☆40Mar 24, 2016Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- This Script will help you to gather information about your victim or friend☆14Jan 30, 2021Updated 5 years ago
- Enter the target number and run the script. The target will receive a phone call every 3 seconds.☆14Jun 24, 2017Updated 8 years ago
- Using the ESP8266 module, scan and display existing Wi-Fi networks.☆12Mar 19, 2021Updated 4 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- A Linux Python application to create maps of 802.11 networks☆78Oct 13, 2013Updated 12 years ago
- Maltego with a twist of wireless☆26Jan 16, 2015Updated 11 years ago
- ☆25Jul 26, 2017Updated 8 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago