ip2k / WiFi-Abuse-AutokillerLinks
Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames
☆32Updated 14 years ago
Alternatives and similar repositories for WiFi-Abuse-Autokiller
Users that are interested in WiFi-Abuse-Autokiller are comparing it to the libraries listed below
Sorting:
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Updated 10 years ago
- apbleed☆24Updated 11 years ago
- Auto Reaver - multiple access point attack using Reaver☆53Updated 8 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆31Updated 10 years ago
- On demand Debian Linux (Tor) Hotspot setup tool☆43Updated last year
- Perform obscure ip lookup for online skype accounts. Can find local and remote ip address. Require craked SkypeKit with deobfuscated debu…☆142Updated 13 years ago
- Build a search engine from nmap XML files☆20Updated 11 years ago
- Attacking WPA/WPA encrypted access point without client.☆50Updated 11 years ago
- Google dorks generator to find open shells (on government sites)☆29Updated 11 years ago
- Web-app to identify the different types of hashes☆21Updated 2 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- Tool to check if an IP of a DblTek GoIP is vulnerable to a challenge-response login system, send SMS messages from the system, execute re…☆65Updated 5 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 11 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Updated 14 years ago
- Viper is a brute-force password cracker.☆24Updated 9 years ago
- Script to add iptables rules (on a linux system) that force all traffic through tor☆39Updated 10 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Resources for increasing power of ath9k devices, such as TP-link WN722N☆17Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆28Updated 9 years ago
- Network white noise collector☆19Updated 9 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- An active network monitor tool☆24Updated 6 years ago
- Modern web-app for simple PGP encryption and decryption☆22Updated 7 years ago
- Session hijacking GUI tool☆15Updated 11 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆11Updated 10 years ago
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.☆15Updated 5 years ago