A Phishing WIFI Rogue Captive Portal!
☆43Feb 12, 2019Updated 7 years ago
Alternatives and similar repositories for RoguePortal
Users that are interested in RoguePortal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Captive-portal login utility for headless environments written in pure bash.☆30Apr 26, 2019Updated 6 years ago
- Fake WiFi Access Point with captive portal☆11May 18, 2025Updated 10 months ago
- This script helps to pass through the captive portals in public Wi-Fi networks. It hijacks IP and MAC from somebody who is already connec…☆31May 10, 2018Updated 7 years ago
- Wifiphisher wifi connect template modified for Wifi Pineapple evilportal module☆11Feb 7, 2017Updated 9 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Extra captive portals for captiveflask plugins of wifipumpkin3☆54Mar 14, 2024Updated 2 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆57Sep 22, 2022Updated 3 years ago
- WiFi Evil Twin Attack - Credential Harvest Tool☆16Dec 2, 2025Updated 3 months ago
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 2 years ago
- This project uses an ESP32-Cam connected to a motion sensor. When the motion sensor is activated, a photo will be submitted to the desire…☆11Sep 4, 2021Updated 4 years ago
- Open Source Tool for automate WPS pin attacks based on a local database and/or 3wifi.stascorp.com (Javascript known algorithms pin genera…☆19Oct 17, 2018Updated 7 years ago
- Detect and alert when Rogue AP and Deauth attacks occur☆14May 16, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆12Jun 12, 2021Updated 4 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆21Feb 27, 2016Updated 10 years ago
- My attempt to turn Emacs into VSCode☆10May 19, 2025Updated 10 months ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Herramienta en desarrollo la cual busca la sencillez a la hora de hacer PenTesting Ethicos. [NO ME HAGO RESPONSABLE DEL MAL USO DE ESTA H…☆11Aug 1, 2023Updated 2 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- ATM security list☆13Aug 10, 2020Updated 5 years ago
- Custom Fake Portal To Harvest Users Social Media Accounts☆59Mar 17, 2022Updated 4 years ago
- Ransomeware attack in linux☆15Aug 12, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack …☆18Apr 8, 2024Updated last year
- A fake captive portal to harvest login credentials made with just an ESP8266☆68Jan 30, 2021Updated 5 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- WiFi Hash Purple Monster, store EAPOL & PMKID packets in an SD CARD using a M5STACK / ESP32 device☆12Aug 27, 2022Updated 3 years ago
- Gets a list of closest lime scooters to a location, or notifies you if one is close☆13May 2, 2023Updated 2 years ago
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)☆23Apr 21, 2022Updated 3 years ago
- ⚡ Perform Evil Twin Attack Using NodeMCU Board☆51Aug 2, 2024Updated last year
- Modern Javascript keylogger with web panel☆23May 29, 2020Updated 5 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Dec 19, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CharityWifi: Integrating a charitable donation into wireless hotspot captive portal.☆31Nov 5, 2012Updated 13 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- Android lock picker and more functionalities☆10Dec 30, 2021Updated 4 years ago
- Trace a program using CPU tracer technology.☆27Nov 9, 2022Updated 3 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated 2 weeks ago
- CopyToAsm (x64) - A Plugin For x64dbg☆31Jul 17, 2018Updated 7 years ago