josh0xA / EspionageLinks
A Linux Packet Sniffing Suite for Automated MiTM Attacks
☆240Updated last year
Alternatives and similar repositories for Espionage
Users that are interested in Espionage are comparing it to the libraries listed below
Sorting:
- Automated rogue access point setup tool.☆196Updated 4 years ago
- Customized Password/Passphrase List inputting Target Info☆90Updated 9 months ago
- A simple script to generate a hidden url for social engineering.☆123Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆134Updated last year
- Web Application Vulnerability Scanner☆127Updated 4 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆192Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆113Updated 2 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆227Updated last year
- A reverse TCP payload and listener both written in python3.☆31Updated last year
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆139Updated 5 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆121Updated last year
- ☆70Updated 2 years ago
- PhishX - The Complete Spear Phishing Tool☆108Updated 6 years ago
- Perform automated network reconnaissance scans☆233Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆114Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆98Updated 8 years ago
- Simple Backdoor Manager with Python (based on weevely)☆94Updated 6 months ago
- Full Valid Fake Data Generator☆99Updated 11 months ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆89Updated 10 months ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆123Updated 5 years ago
- A Tool using Shodan and RTSP to find vulnerable cameras around the world.☆60Updated 4 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆61Updated 2 years ago
- on-the-fly☆85Updated last year
- Wi-Fi Exploit Tool☆53Updated 5 years ago
- Web Service write in Python for control and protect your android device remotely.☆193Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago