killuminati2012 / wifipineapple
Wifi Pineapple - Repository, Issue tracker, Wiki
☆40Updated 12 years ago
Alternatives and similar repositories for wifipineapple:
Users that are interested in wifipineapple are comparing it to the libraries listed below
- WiFi Pineapple DIY☆75Updated 8 years ago
- WPA2 Key reinstallation attack (KRACK) on the WiFi Pineapples☆27Updated 7 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆37Updated 9 years ago
- An attacker oriented library for the Teensy microcontroller.☆11Updated 3 years ago
- Misc scripts and tools for WiFi☆102Updated 3 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Porting the Pineapple to the Raspberry Pi☆83Updated 11 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- My custom payloads for the Hak5 BashBunny☆20Updated 7 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Updated 8 years ago
- Mana Toolkit - Module for the WiFi Pineapple (NANO/TETRA)☆54Updated 5 years ago
- WPS scan and pwn tool☆67Updated 5 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 9 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆20Updated 10 years ago
- LET ME SLASH THE PINEAPPLE FOR FUN☆29Updated 9 years ago
- Debian live build for the Pocket-Kali☆41Updated 6 years ago
- Proof of Concept of HID26 Bruteforce☆28Updated 2 years ago
- ProtoType for a handheld device used to grab WPA four way handshakes☆38Updated 6 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆19Updated 10 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- giskismet – Wireless recon visualization tool☆49Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago
- FruityDisplay☆10Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 2 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆31Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago