Some scripts and stuff for wardriving and wifi hacks .... works great on kali and ubuntu 32 bit ...Reaver likes 32 bit binaries.
☆27May 16, 2021Updated 4 years ago
Alternatives and similar repositories for wifi_wardriving
Users that are interested in wifi_wardriving are comparing it to the libraries listed below
Sorting:
- Configure kali 2020.4 headless/headed for RPi4b☆15Jan 28, 2021Updated 5 years ago
- Kali Linux on Raspberry PI 3, 3b+ Post Install☆15Nov 24, 2020Updated 5 years ago
- A montage of ethical hacking based resources, please ensure you do not upload anything that violates copyright law☆12Nov 29, 2020Updated 5 years ago
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago
- Hacking Tools For All Debian-based OS☆50Apr 10, 2018Updated 7 years ago
- Random Software That I Have Reverse-Engineered. Includes notes, patches, and all other related files for each.☆34Aug 16, 2018Updated 7 years ago
- A curated list of awesome warez and piracy links☆28Oct 21, 2020Updated 5 years ago
- Bluetooth wardriving utility☆105Aug 16, 2023Updated 2 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 10 years ago
- ☆13May 22, 2023Updated 2 years ago
- Test proxies returned by a Masscan scan☆31Feb 28, 2019Updated 7 years ago
- Modified source code for "Mega Man X Online: Deathmatch" fan game.☆10Updated this week
- This SMART Pi ONE distribution for managing Klipper 3D printers with Mainsail provides all you need.☆10Oct 29, 2025Updated 4 months ago
- # hpro This is a python base script from which you can hack or clone any person's facebook friendlist or followers accounts which have …☆11May 9, 2021Updated 4 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago
- iRecovery++ is a program designed to communicate with the iPhone/iPod Touch/iPad via iBoot and iBSS via a USB interface. This program is …☆49Nov 23, 2010Updated 15 years ago
- Repo of Animations For AA☆10Apr 17, 2021Updated 4 years ago
- A network attack using Evil Twin Framework paired in NodeMCU ESP8266 device to exploit vulnerabilities in WiFi with low cost☆14Jul 25, 2023Updated 2 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- An Arduino AI Assistant. (4A! Yay!). This plugin integrates Claude, ChatGPT, Gemini, LM Studio and more directly into the Arduino IDE.☆18Mar 2, 2026Updated last week
- ☆13Jan 13, 2024Updated 2 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- DuckyTails is a interpreter that runs Ducky Scripts from any pendrive. You don't need a USB Rubber Ducky☆12Sep 29, 2018Updated 7 years ago
- nyeri☆15Feb 25, 2021Updated 5 years ago
- Use Mycroft voice commands to control a MagicMirror via the MMM-RemoteControl module☆11Nov 24, 2020Updated 5 years ago
- NFC Card Data Reader (Android)☆11Apr 30, 2014Updated 11 years ago
- SensePost's modified hostapd for wifi attacks.☆13Oct 11, 2020Updated 5 years ago
- WiFi hacking with aircrack-ng support scripts☆11Oct 4, 2017Updated 8 years ago
- Don't just be a script Kiddie☆11Apr 19, 2023Updated 2 years ago
- A module for MagicMirror which determines the status of devices on the network based on their MAC address.☆10May 14, 2023Updated 2 years ago
- Cryptocurrencies algorithmic trading strategies☆12Nov 20, 2018Updated 7 years ago
- Boot from USB stick with multiple ISO files of: Ubuntu + Windows XP/7/10 + WindowsPE (windows live)☆10Jan 20, 2021Updated 5 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Pentest tool com foco em teste de intrusão em redes wireless para Windows☆12Dec 24, 2019Updated 6 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- ☆10Apr 28, 2018Updated 7 years ago
- ☆11Mar 4, 2024Updated 2 years ago