Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, s…
☆51Aug 12, 2020Updated 5 years ago
Alternatives and similar repositories for EHTools
Users that are interested in EHTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Wireless Attack Framework☆76Mar 18, 2019Updated 7 years ago
- The best WiFi spy avalaible for hire! Made for hackers, for hackers☆235Apr 23, 2019Updated 6 years ago
- An extreme encryption for everyone, encrypt your text before sending to anyone. Alphabets and numbers are going to be encrypted like a he…☆15Jul 31, 2024Updated last year
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated last month
- ## Now you can download the most powerful tools using this simple script ### Screenshot ☆11May 15, 2016Updated 9 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆110Jul 31, 2023Updated 2 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- A simple port scanner using python☆16Jan 28, 2023Updated 3 years ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆69Jul 25, 2023Updated 2 years ago
- wifisky Python script for pentesting wireless networks☆105Aug 28, 2019Updated 6 years ago
- Wordlists for FFUF☆56May 17, 2025Updated 10 months ago
- Threat Hijacking Simple Implementation☆20Feb 24, 2025Updated last year
- You can create a virus for a Laptop or phone with this command bell☆10Mar 3, 2021Updated 5 years ago
- Using this tool you can easily add so many members from any group to your group. Less than 2 minutes. Super easy. Time saver. But this to…☆16Jul 11, 2021Updated 4 years ago
- Track Bluetooth devices and their proximity to a GPS location.☆23Apr 29, 2023Updated 2 years ago
- This is the tutorial to repair kex in rootless nethunter termux.☆20Oct 1, 2023Updated 2 years ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91May 18, 2025Updated 10 months ago
- Easy install Oracle Java only for arm64. Tested on termux and raspberry pi.☆16Jan 3, 2025Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools tha…☆15Dec 15, 2018Updated 7 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- Wifi Stealer☆27Nov 13, 2020Updated 5 years ago
- Generate reverse shells in command line with Go !☆20Aug 9, 2020Updated 5 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Hackerinfo infromations Web Application Security☆75May 22, 2023Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆53Apr 14, 2021Updated 4 years ago
- Crack passwords with Hashcat using a Discord Bot.☆28Oct 30, 2023Updated 2 years ago
- ☆21Dec 2, 2024Updated last year
- A Cross-Platform Telegam Members Scraping and Adding Tool☆10May 27, 2021Updated 4 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Information Gathering tool for a Website or IP address☆68Feb 7, 2024Updated 2 years ago
- ☆10Apr 2, 2023Updated 2 years ago
- Complete Automated pentest framework for Servers, Application Layer to Web Security☆11Dec 14, 2019Updated 6 years ago
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆292Feb 8, 2025Updated last year
- ☆10Sep 6, 2023Updated 2 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆20Apr 27, 2025Updated 10 months ago