hak5 / homebrew-wifi-coconutLinks
☆13Updated 2 years ago
Alternatives and similar repositories for homebrew-wifi-coconut
Users that are interested in homebrew-wifi-coconut are comparing it to the libraries listed below
Sorting:
- This repository is a mirror of https://git.openwrt.org/openwrt/openwrt.git It is for reference only and is not active for check-ins or fo…☆20Updated 4 years ago
- WiFi Pineapple MK7 Community Packages☆51Updated 3 years ago
- WiFi Hacking Workflow with WiFi Pineapple Mark VII API☆84Updated last year
- Windows Remote Administration Tool that uses Discord as C2☆30Updated 3 years ago
- An embedded key/value database for Go.☆11Updated 3 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- System Files for the Hak5 Shark Jack☆46Updated last year
- Find open databases - Powered by Binaryedge.io☆14Updated 5 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆57Updated 2 years ago
- ☆26Updated 3 months ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆26Updated 4 years ago
- Hak5 WiFi Coconut Userspace☆131Updated last year
- Plugins for airgeddon☆74Updated this week
- Collection of extra pentest tools for Kali Linux☆109Updated last week
- ☆20Updated last year
- Legba recipes.☆50Updated last year
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆114Updated 2 years ago
- Developer documentation for the WiFi Pineapple Mark 7 - product documentation can be found at docs.hak5.org☆50Updated 3 months ago
- Pentesting Suite☆37Updated 2 months ago
- Facial Recognition and its dangers for Special Forces Operatives☆24Updated last year
- A certificate transparency log keyword sniffer written in python☆82Updated 2 years ago
- Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.☆52Updated 6 years ago
- Encodes a message using emojis based on a specified pattern.☆18Updated last year
- Automate your Wifi Pineapple Mk. 7 Workflow!☆56Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆61Updated 2 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆38Updated 3 years ago