hak5 / homebrew-wifi-coconutLinks
☆13Updated 3 years ago
Alternatives and similar repositories for homebrew-wifi-coconut
Users that are interested in homebrew-wifi-coconut are comparing it to the libraries listed below
Sorting:
- This repository is a mirror of https://git.openwrt.org/openwrt/openwrt.git It is for reference only and is not active for check-ins or fo…☆22Updated 4 years ago
- An embedded key/value database for Go.☆11Updated 3 years ago
- WiFi Pineapple MK7 Community Packages☆52Updated 3 years ago
- Windows Remote Administration Tool that uses Discord as C2☆32Updated 3 years ago
- System Files for the Hak5 Shark Jack☆49Updated last year
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Plugins for airgeddon☆77Updated last week
- Evil Crow Cable Pro device☆125Updated 3 weeks ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆117Updated 2 years ago
- WiFi Hacking Workflow with WiFi Pineapple Mark VII API☆86Updated last year
- Hak5 WiFi Coconut Userspace☆134Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆78Updated this week
- A certificate transparency log keyword sniffer written in python☆82Updated 2 years ago
- ☆26Updated 4 months ago
- Developer documentation for the WiFi Pineapple Mark 7 - product documentation can be found at docs.hak5.org☆51Updated 4 months ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Updated 2 years ago
- Encodes a message using emojis based on a specified pattern.☆18Updated last year
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆53Updated 3 years ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆38Updated 3 years ago
- Pentesting Suite☆48Updated 4 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Fork from @rsmudge/armitage☆137Updated 2 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆27Updated 4 years ago
- ☆21Updated 2 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆111Updated 2 years ago
- ☆11Updated 2 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆17Updated last month
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆69Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64Updated 2 years ago