an other wifi mapping tool
☆147Jul 27, 2017Updated 8 years ago
Alternatives and similar repositories for wifiScanMap
Users that are interested in wifiScanMap are comparing it to the libraries listed below
Sorting:
- ☆49Aug 16, 2016Updated 9 years ago
- Create wifi access points on the go (karma-like), simulate internet connectivity, gather whatever is sent ;)☆11Aug 7, 2025Updated 7 months ago
- A Linux Python application to create maps of 802.11 networks☆78Oct 13, 2013Updated 12 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Code to make an ESP8266/NodeMCU Wifi Scanner / Dope Scope☆102Jan 24, 2018Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- ☆54Sep 10, 2016Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- An android application which is useful in capturing BLE advertisement packets and storing the data collected in the phone storage as a cs…☆11Jun 29, 2017Updated 8 years ago
- Tool for capturing and mapping locations of SSIDs from wireless beacons and client requests☆25Mar 4, 2018Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆21Dec 3, 2015Updated 10 years ago
- Exploiting HID VertX and EDGE access control systems☆24Jan 17, 2017Updated 9 years ago
- ☆36Mar 2, 2022Updated 4 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Jan 9, 2018Updated 8 years ago
- MASLOW: an Open WiFi Detector with ESP8266☆23Dec 21, 2015Updated 10 years ago
- Cross-platform radio signal visualizer for HackRF & other SDR platforms.☆17Oct 1, 2020Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Docker image for rbanffy/vm370☆26Dec 30, 2025Updated 2 months ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Sep 9, 2015Updated 10 years ago
- Originally intended to be a controller for a RetroPie. A soft power controller that allows for Raspberry Pi proper shutdown. Intention is…☆22Jun 10, 2017Updated 8 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- docker based telnet honeypot☆80Feb 19, 2018Updated 8 years ago
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆18Jul 13, 2020Updated 5 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- ☆19Dec 2, 2017Updated 8 years ago
- A starter codebase for a Windrift game☆11Nov 20, 2021Updated 4 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 8 years ago