A Router WiFi key recovery/cracking tool with a twist.
☆92Nov 2, 2018Updated 7 years ago
Alternatives and similar repositories for Project-Tauro
Users that are interested in Project-Tauro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Override factory brightness settings with ROOT Access [Android]☆14May 15, 2023Updated 2 years ago
- Control the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。☆16Mar 24, 2017Updated 9 years ago
- A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng☆14Jan 1, 2019Updated 7 years ago
- A tool for recover router password☆34Jun 19, 2018Updated 7 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63May 29, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A free script by sid that deauth all user from the network contiuosly forever☆54Apr 28, 2018Updated 7 years ago
- Gateway between SMTP/POP3 and TOX protocol.☆13Feb 10, 2018Updated 8 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆28Jun 19, 2020Updated 5 years ago
- Educational Java Bot Virus☆10Mar 14, 2020Updated 6 years ago
- The WiFi Penetration Toolkit☆34Jul 8, 2021Updated 4 years ago
- Scapy 802.1X exploitation framework.☆20Mar 2, 2021Updated 5 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16May 4, 2019Updated 6 years ago
- Chrome Crusader☆24Jun 19, 2019Updated 6 years ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆652Oct 15, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Captive wifi hotspot bypass tool for Linux☆67Jan 17, 2019Updated 7 years ago
- Android app for hanging device with ROOT Access☆14Aug 22, 2018Updated 7 years ago
- Black-Dragon Tools Installer For Pentesting And Hack Account,Work On Terminal How To Install it Tested On Termux(Android 6.0) $ pkg upda…☆15Feb 1, 2021Updated 5 years ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- A wireless router when newly installed has a default admin password depending on its manufacturer and model. If not changed, the router c…☆16Apr 4, 2014Updated 12 years ago
- A termux tool to get password of any WPS enabled router.☆32Nov 1, 2025Updated 5 months ago
- A Fantasy Grounds module to implement the SW5e game. A home-brew (OGL) rule set based in the Star Wars universe, legends, and lore.☆11May 23, 2023Updated 2 years ago
- All crack email (yahoospambox:hotmai) ...... created by mohammad && arman☆10Sep 5, 2020Updated 5 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- A Ruby Gem for interacting with Android API from within Termux☆18Mar 24, 2019Updated 7 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- GPS tracking system☆17Aug 9, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- aircrack-ng gui 2019☆20Oct 30, 2018Updated 7 years ago
- Hacks credit card PAN numbers by using partial Hashes, and a list of random PAN [pins]☆86Oct 31, 2016Updated 9 years ago
- LeakIX maintained plugins implementing the l9format golang plugin interface.☆12Dec 9, 2021Updated 4 years ago
- Script for setting up ADB for debugging over wifi☆13Aug 12, 2019Updated 6 years ago
- Refluxion -- MITM WPA attacks tool☆39Jul 18, 2020Updated 5 years ago
- Hack Camera, Microphone, Location, Clipboard With Just a Link. Also, Get Many Details About Victim's Device. And So On...☆20Apr 8, 2022Updated 4 years ago
- Distributing WPA hash cracking.☆22Dec 5, 2022Updated 3 years ago