k4yt3x / mute
MUTE (WxKill) is an Python Application that kills wifi signals
☆11Updated 6 years ago
Alternatives and similar repositories for mute
Users that are interested in mute are comparing it to the libraries listed below
Sorting:
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 5 months ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Software exploitation training material☆15Updated 7 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Various exploits☆10Updated 8 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Updated 8 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Share wifi on windows with arranged password like every hour or every day☆15Updated 8 years ago
- ☆12Updated 10 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆30Updated 9 years ago
- Download youtube video cover image.☆7Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- Google dorks generator to find open shells (on government sites)☆30Updated 10 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 6 years ago
- A TCP-Client connected Keylogger in C#☆12Updated 8 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆17Updated 11 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- SkyRAT - Powershell Remote Administration Tool☆32Updated 7 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆20Updated 9 years ago
- Find all cool documents on GOV and Info sites☆18Updated 5 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- ~ ADMIN Panel Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆21Updated 8 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- AES encrypted python backdoor that communicates AES encrypted data☆9Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago