ip2k / WiFi-Abuse-AutokillerLinks
Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames
☆32Updated 14 years ago
Alternatives and similar repositories for WiFi-Abuse-Autokiller
Users that are interested in WiFi-Abuse-Autokiller are comparing it to the libraries listed below
Sorting:
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 5 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆31Updated 10 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Updated 14 years ago
- Auto Reaver - multiple access point attack using Reaver☆53Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- DF and other tools to explore a 2.4GHz environment.☆73Updated 6 years ago
- On demand Debian Linux (Tor) Hotspot setup tool☆43Updated last year
- apbleed☆24Updated 11 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Updated 10 years ago
- Session hijacking GUI tool☆15Updated 11 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Command-line access to Up1☆43Updated 7 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- MacGeiger - a tool to track down the location of WIFI APs with sound (Geigercounter-like)☆56Updated 4 years ago
- Automating and Enhancing Nmap using Python☆17Updated 7 years ago
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.☆15Updated 5 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Web-app to identify the different types of hashes☆21Updated 2 years ago
- Attacking WPA/WPA encrypted access point without client.☆50Updated 11 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆11Updated 10 years ago
- Perform obscure ip lookup for online skype accounts. Can find local and remote ip address. Require craked SkypeKit with deobfuscated debu…☆142Updated 13 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- A Python Script that prepairs and installs a Raspberry Pi compatiable distro to an SD Card☆16Updated 13 years ago
- Tool to check if an IP of a DblTek GoIP is vulnerable to a challenge-response login system, send SMS messages from the system, execute re…☆64Updated 5 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- An active network monitor tool☆25Updated 6 years ago
- Script to add iptables rules (on a linux system) that force all traffic through tor☆38Updated 10 years ago
- Resources for increasing power of ath9k devices, such as TP-link WN722N☆17Updated 10 years ago