ip2k / WiFi-Abuse-AutokillerLinks
Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames
☆33Updated 13 years ago
Alternatives and similar repositories for WiFi-Abuse-Autokiller
Users that are interested in WiFi-Abuse-Autokiller are comparing it to the libraries listed below
Sorting:
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- BlackArch configuration for the bash shell.☆12Updated 4 years ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆19Updated 7 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Privacy-aware recommendations to proprietary software.☆8Updated 9 years ago
- A collection of awesome web crawler,spider in different languages☆12Updated 7 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 9 years ago
- App for controlling the DNSCrypt Proxy on Android☆10Updated 7 years ago
- Scrapping onion domains☆14Updated 7 years ago
- ParrotSec rootfs arm (armhf at the moment) builder.☆17Updated 7 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- minepeon-base☆24Updated 10 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 10 years ago
- Open-source Circle of 6 with improved security and privacy features. PLEASE NOTE: For the new Circulo app please visit: https://gitlab.co…☆28Updated 6 years ago
- Bat file to collect software and hardware system information without admin permissions.☆15Updated 3 years ago
- Automating and Enhancing Nmap using Python☆17Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Captive Portal Evasion Tool☆14Updated 8 years ago
- Google dorks generator to find open shells (on government sites)☆30Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Updated 2 years ago
- A DIY project to show failed ssh login attempts on a map in real-time☆11Updated last month
- Steal xfinity-comcast subscriber credentials.☆32Updated 9 years ago
- Android application which allows sending SMS, with a specific SMSC without changing system defaults.☆13Updated 10 years ago