hacefresko / EvilPortalView external linksLinks
Python script to perform phishing attacks through captive portals, made for learning purposes
☆57Sep 22, 2022Updated 3 years ago
Alternatives and similar repositories for EvilPortal
Users that are interested in EvilPortal are comparing it to the libraries listed below
Sorting:
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Enhanced functions and new features for airgeddon!☆117Nov 3, 2025Updated 3 months ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆26Jul 28, 2018Updated 7 years ago
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- A Phishing WIFI Rogue Captive Portal!☆43Feb 12, 2019Updated 7 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 4 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- ☆12Feb 1, 2026Updated last week
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Automated rogue access point setup tool.☆201Apr 2, 2021Updated 4 years ago
- ☆20Jan 19, 2021Updated 5 years ago
- Code, data, and (possibly) schematics for recording wireless network data around a city☆13Aug 28, 2013Updated 12 years ago
- 802.11 Exploitation Tool for use with Kali 2. More tools available than WHAT or WHAT Pi☆16Apr 3, 2016Updated 9 years ago
- WiFi Evil Twin Attack - Credential Harvest Tool☆11Dec 2, 2025Updated 2 months ago
- This repo contains various Design of Captive Portals for your Evil Twin/Fake Access Point Attacks.☆28Dec 4, 2020Updated 5 years ago
- A super portable evil device, based on the ESP8266 board, running Micropython and equipped with a single button and a small OLED display☆70Jun 5, 2020Updated 5 years ago
- rsGen is a Reverse Shell Payload Generator for hacking.☆79Mar 13, 2022Updated 3 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Program to leak anti-virus behaviour and such☆14Apr 18, 2019Updated 6 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 6 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- Windows_Exfil** is a proof-of-concept script for automating data collection and exfiltration via Flipper Zero🐬configured as a "BadUSB." …☆20Dec 26, 2024Updated last year
- ☆13Oct 14, 2017Updated 8 years ago
- ⚡ Perform Evil Twin Attack Using NodeMCU Board☆51Aug 2, 2024Updated last year
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Apr 20, 2021Updated 4 years ago
- collect☆17Aug 29, 2019Updated 6 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆16Jul 12, 2021Updated 4 years ago