helpsystems / wiwoLinks
wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) can be managed by a Python framework.
☆94Updated 9 years ago
Alternatives and similar repositories for wiwo
Users that are interested in wiwo are comparing it to the libraries listed below
Sorting:
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆56Updated 9 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 5 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- YAPDNS☆39Updated 9 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Sensor software☆68Updated 3 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- Packet-o-matic NG !☆65Updated 9 months ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- IPV6 MITM attack tool☆92Updated 11 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- Scapy docs, examples, scripts and other stuff☆40Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Veil Catapult is no longer supported☆76Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆198Updated 8 years ago