inguardians / kismapping
Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the heatmap overlaid on top.
☆55Updated 4 years ago
Alternatives and similar repositories for kismapping:
Users that are interested in kismapping are comparing it to the libraries listed below
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setup☆87Updated 3 years ago
- giskismet – Wireless recon visualization tool☆53Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆49Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- !!! Deprecated, see www.rfid-tool.com instead !!! The ESP-RFID-Thief is a port of the Tastic RFID Thief to the ESP12S chip with the addit…☆86Updated 7 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆71Updated 7 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆39Updated 4 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆80Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- Open source SDR LTE software suite☆19Updated 7 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆40Updated 4 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 5 years ago
- Mobile UI for kismet☆179Updated 7 months ago
- Malicious Link Blog☆25Updated last year
- A simple wrapper for l2ping which shows rssi☆18Updated 4 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆87Updated 8 months ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Digital Preservation Software (National Archives of Australia)☆37Updated 13 years ago
- A simulation of the RFCTF KOTH game.☆10Updated 4 years ago
- ☆57Updated 4 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Updated 9 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Updated last year
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Z-Wave Packet Interception and Injection Tool☆34Updated 9 years ago
- Pentest dropbox setup scripts for Kali Linux☆89Updated 9 years ago
- tools for analyzing strings from password lists☆58Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago