muhammad-ahmad-31 / Project-MoanaView external linksLinks
Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less bugs.
☆26Jul 28, 2018Updated 7 years ago
Alternatives and similar repositories for Project-Moana
Users that are interested in Project-Moana are comparing it to the libraries listed below
Sorting:
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 8 months ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆57Sep 22, 2022Updated 3 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 7 years ago
- ☆16Jul 18, 2020Updated 5 years ago
- a plugin for pwnagotchi that shows a openstreetmap with positions of ap-handshakes in the webbrowser☆22Dec 9, 2019Updated 6 years ago
- Random OSINT idea tool thing☆22Jan 11, 2026Updated last month
- A Phishing WIFI Rogue Captive Portal!☆43Feb 12, 2019Updated 7 years ago
- Sends a verify code to your email from microsoft☆12Aug 17, 2025Updated 5 months ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- RubberDucky like payloads for DigiSpark Attiny85.☆22Dec 31, 2025Updated last month
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- ESP8266 deauther with basic phishing captive portal (AKA evil twin attack)☆48May 16, 2017Updated 8 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Project: AI Roleplay Companion Key Features: ✅ Ad-Free & Free: No paywalls, no ads in chats 🧠 Persistent Memory: Solves companion AI's…☆17Nov 3, 2025Updated 3 months ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆121Apr 6, 2023Updated 2 years ago
- A lightweight ducky script generator written in python.☆36Feb 6, 2021Updated 5 years ago
- A fake captive portal to harvest login credentials made with just an ESP8266☆68Jan 30, 2021Updated 5 years ago
- scrap email from instagram user followers☆11Jul 21, 2023Updated 2 years ago
- ioBroker Adapter for weishaupt WEM Portal☆13Jan 9, 2025Updated last year
- Hack any account sending fake nitro QR code (only for educational purpose)☆16Jan 7, 2022Updated 4 years ago
- Allows invisible Payloads to be decoded and encoded.☆28Mar 5, 2024Updated last year
- Analyses wifi probes (from mobile phones etc) and looks them up on wigle to provide possibly commonly visited locations of people near yo…☆29Jan 10, 2026Updated last month
- The WiFi Penetration Toolkit☆29Jul 8, 2021Updated 4 years ago
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆18Mar 25, 2025Updated 10 months ago
- Android App - RemoteCodeExecution☆14Aug 20, 2013Updated 12 years ago
- Advanced malware sandbox evasion using C☆17Jan 23, 2026Updated 3 weeks ago
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- A tiny tool to stress test your servers with your android phone.☆10Mar 27, 2014Updated 11 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- A network attack using Evil Twin Framework paired in NodeMCU ESP8266 device to exploit vulnerabilities in WiFi with low cost☆14Jul 25, 2023Updated 2 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- Generates 3D representations of floorplans by finding the corners and edges from a single image.☆12Aug 2, 2018Updated 7 years ago