michelep / NidanLinks
An active network monitor tool
☆24Updated 6 years ago
Alternatives and similar repositories for Nidan
Users that are interested in Nidan are comparing it to the libraries listed below
Sorting:
- Get clients and access points.☆49Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated last month
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆39Updated 4 years ago
- Various exploits☆10Updated 8 years ago
- Gets Reverse DNS, GeoIP, NMAP, Traceroute and pulls HTTP Headers for an IP address.☆21Updated 10 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Updated 14 years ago
- A Linux Python application to create maps of 802.11 networks☆77Updated 11 years ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Updated 8 years ago
- A Python Script To Automatically Download, Provision and Update a Kali Linux VM in Virtualbox☆46Updated 4 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- Simple detector of ARP poisoning attack☆28Updated 10 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 11 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Updated 11 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 10 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆31Updated 7 years ago
- WiFi Pineapple DIY☆78Updated 8 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…