koutto / pi-pwnbox-rogueap
Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap
☆1,797Updated last year
Alternatives and similar repositories for pi-pwnbox-rogueap:
Users that are interested in pi-pwnbox-rogueap are comparing it to the libraries listed below
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,303Updated 7 months ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,444Updated 7 months ago
- Powerful framework for rogue access point attack.☆2,143Updated last year
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,250Updated last year
- This is a multi-use bash script for Linux systems to audit wireless networks.☆6,882Updated last week
- All MITM attacks in one place.☆971Updated 3 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,412Updated last year
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆2,057Updated 10 months ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆900Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,706Updated 6 months ago
- Transparent proxy through Tor for Kali Linux OS☆1,116Updated last year
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,159Updated last year
- Update Version 3.1 added free SMS messaging.☆481Updated 3 years ago
- Information gathering tool - OSINT☆1,281Updated 3 years ago
- The LAZY script will make your life easier, and of course faster.☆4,176Updated 3 years ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆1,041Updated 5 months ago
- All In One Web Recon☆2,422Updated 5 months ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆902Updated 2 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,732Updated 2 months ago
- Wi-Fi Exploitation Framework☆2,524Updated 7 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,344Updated last month
- Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Googl…☆1,560Updated 2 years ago
- Find exploits in local and online databases instantly☆1,729Updated 3 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,016Updated 7 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,170Updated 10 months ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,112Updated 4 months ago
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆364Updated 3 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆3,992Updated 3 months ago
- Basics on commands/tools/info on how to assess the security of mobile applications☆1,547Updated last year
- Search for leaked credentials☆1,331Updated 3 years ago