gianfelicevincenzo / RoguePortalView external linksLinks
A Phishing WIFI Rogue Captive Portal!
☆43Feb 12, 2019Updated 7 years ago
Alternatives and similar repositories for RoguePortal
Users that are interested in RoguePortal are comparing it to the libraries listed below
Sorting:
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Captive-portal login utility for headless environments written in pure bash.☆30Apr 26, 2019Updated 6 years ago
- Wifiphisher wifi connect template modified for Wifi Pineapple evilportal module☆11Feb 7, 2017Updated 9 years ago
- This script helps to pass through the captive portals in public Wi-Fi networks. It hijacks IP and MAC from somebody who is already connec…☆30May 10, 2018Updated 7 years ago
- Fake WiFi Access Point with captive portal☆10May 18, 2025Updated 8 months ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆21Feb 27, 2016Updated 9 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆57Sep 22, 2022Updated 3 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆26Jul 28, 2018Updated 7 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- My attempt to turn Emacs into VSCode☆10May 19, 2025Updated 8 months ago
- Herramienta en desarrollo la cual busca la sencillez a la hora de hacer PenTesting Ethicos. [NO ME HAGO RESPONSABLE DEL MAL USO DE ESTA H…☆10Aug 1, 2023Updated 2 years ago
- This project uses an ESP32-Cam connected to a motion sensor. When the motion sensor is activated, a photo will be submitted to the desire…☆11Sep 4, 2021Updated 4 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- ATM security list☆12Aug 10, 2020Updated 5 years ago
- Telegram Group Manager Bot Written In Python Using Pyrogram.☆13Aug 25, 2023Updated 2 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Sep 11, 2025Updated 5 months ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- View emails in Discord using Cloudflare Email Routing☆10Dec 15, 2023Updated 2 years ago
- WiFi Evil Twin Attack - Credential Harvest Tool☆11Dec 2, 2025Updated 2 months ago
- ☆13Oct 14, 2017Updated 8 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 2 years ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆27Dec 11, 2020Updated 5 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Nov 25, 2021Updated 4 years ago
- a phishing page☆14Aug 7, 2017Updated 8 years ago
- Extra captive portals for captiveflask plugins of wifipumpkin3☆53Mar 14, 2024Updated last year
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- ☆13Feb 7, 2020Updated 6 years ago
- A Simple RedLineStealer☆13Aug 30, 2023Updated 2 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago