g13net / PwnBerryPiLinks
☆53Updated 13 years ago
Alternatives and similar repositories for PwnBerryPi
Users that are interested in PwnBerryPi are comparing it to the libraries listed below
Sorting:
- This is the Command & Control component of the PlugBot project☆102Updated 3 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆150Updated 10 years ago
- Powershell Reverse Rubber Ducky☆57Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Updated 9 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- WPS scan and pwn tool☆70Updated 6 years ago
- Useful pentesting scripts☆85Updated 11 months ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Reliable Teensy Penetration Testing Payload☆182Updated 13 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆68Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated 2 years ago
- Porting the Pineapple to the Raspberry Pi☆85Updated 12 years ago
- Search exploits in multiple exploit databases!☆86Updated 5 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- new WPS attack tool☆60Updated 10 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Updated 9 years ago
- Search google for shellshock vulnerable sites☆27Updated 11 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Updated 9 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- Unofficial Kali Documentation Project☆159Updated 10 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆67Updated 8 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆60Updated 6 years ago
- Stargate☆96Updated 9 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 10 years ago