A proof of concept project to detect an stop Evil Twin Attacks.
☆17Oct 3, 2019Updated 6 years ago
Alternatives and similar repositories for TwinHunter
Users that are interested in TwinHunter are comparing it to the libraries listed below
Sorting:
- Evil Portal for the Wifi Pineapple Nano and Wifi Pineapple Tetra☆134Jun 2, 2020Updated 5 years ago
- ☆12Jan 17, 2017Updated 9 years ago
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- A little python script to uncovering hidden SSIDs.☆11Oct 29, 2017Updated 8 years ago
- repository to hold prebuilt kali nethunter kernel☆17Nov 22, 2021Updated 4 years ago
- This is the updated and error free driver for TP-link wn772n v2/3 wifi adapter.☆19Nov 6, 2022Updated 3 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- Tool to detect all available wireless networks within your local vicinity (including hidden networks). Can be run in either Passive mode …☆19Aug 14, 2018Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Steal xfinity-comcast subscriber credentials.☆37Aug 12, 2015Updated 10 years ago
- WiFi Pineapple MK6 updated content repo☆40Mar 3, 2026Updated 2 weeks ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆15Mar 22, 2023Updated 2 years ago
- ☆14Mar 20, 2025Updated last year
- A jamming-and-replay attack using SDR☆18Feb 25, 2019Updated 7 years ago
- Revealing unknown GATT/BLE protocol by mediation in communication between device and client☆20Feb 10, 2026Updated last month
- wifi password cracker☆15Oct 31, 2019Updated 6 years ago
- Themes for the WiFi Pineapple☆23Mar 4, 2021Updated 5 years ago
- Best Tool to Increase Instagram Follower☆18Sep 19, 2021Updated 4 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Turns a Raspberry Pi 3 into a configurable hotspot.☆28Jul 19, 2018Updated 7 years ago
- Dependency of OnePlus 8 (instantnoodle), OnePlus 8 Pro (instantnoodlep), OnePlus 8T (kebab)☆17Mar 7, 2024Updated 2 years ago
- OS Patch Level changer for Android Boot && Recovery partitions☆12Nov 11, 2020Updated 5 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Android App - RemoteCodeExecution☆14Aug 20, 2013Updated 12 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Quick Folder Menu is a tiny application that opens a menu of the folder you specify as a command line parameter.☆15Apr 4, 2014Updated 11 years ago
- The real GPT-4 with image access (You probably don't have access)☆12Mar 17, 2023Updated 3 years ago
- Maintained list of Stretchoid scanner IPs☆11Aug 3, 2025Updated 7 months ago
- Script to Send Multiple Messages from WhatsApp☆11May 18, 2019Updated 6 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Sep 24, 2019Updated 6 years ago
- SIM Card tunnel for Alcatel OT-918D☆39Sep 29, 2014Updated 11 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts using a list of various payloads.☆29Sep 4, 2025Updated 6 months ago