ra1nb0rn / CDeauthView external linksLinks
A WiFi deauthentication tool written in C
☆17Sep 20, 2019Updated 6 years ago
Alternatives and similar repositories for CDeauth
Users that are interested in CDeauth are comparing it to the libraries listed below
Sorting:
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- A collection of malware that we use for testing and training☆12Nov 11, 2020Updated 5 years ago
- ath10k QCA9377 firmware obtained from kali linux 2016.2 From my testing is the only one that allows monitor mode to work correctly☆13Aug 23, 2019Updated 6 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆22Oct 9, 2025Updated 4 months ago
- A multithread tool to scan for available APs and display their Signal Strength, Security Protocol, SSID and channels. Written in Python (…☆12Jul 6, 2021Updated 4 years ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 6 months ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 4 months ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆37Apr 9, 2021Updated 4 years ago
- Rival UAV Detection and Tracking Algorithm for Fighter UAVs☆10Nov 10, 2024Updated last year
- synced is a user space Synchronous Ethernet (Sync-E) stack for the Linux operating system. synced facilitates Sync-E, according to the IT…☆11Feb 5, 2025Updated last year
- ☆14May 14, 2022Updated 3 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.☆16May 22, 2025Updated 8 months ago
- to show all hidden EFIs and any APFS subvolumes☆11Jul 5, 2021Updated 4 years ago
- Angry Oxide running on Raspberry Pi Zero 2 with waveshare 2.13” e paper HAT☆11May 28, 2024Updated last year
- All my POC related to malware development☆14May 13, 2024Updated last year
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Binary and Static Releases☆16Nov 18, 2025Updated 2 months ago
- Reaque is an mobile tool where we can share and find things related to Mozambique, the people and things there. From reflections and cult…☆13Sep 10, 2019Updated 6 years ago
- Small management app for home router based on Raspberry Pi☆16Jan 3, 2016Updated 10 years ago
- ALL IN ONE Hacking Tool For Hackers☆10Dec 12, 2020Updated 5 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- Enter the target number and run the script. The target will receive a phone call every 3 seconds.☆14Jun 24, 2017Updated 8 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- 🏛️ Open-source toolkit for accessing SEC EDGAR financial data with Python and TypeScript/JavaScript SDKs. Features comprehensive parsing…☆24Aug 13, 2025Updated 6 months ago
- Next generation radiation mapping using UAS assisted dynamic monitoring networks☆10Mar 1, 2020Updated 5 years ago
- Aggressive Mass AP Deauth/Jammer (PWN ALL WIFI IN RANGE)☆14May 26, 2023Updated 2 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- AM335X-FreeRTOS-lwip☆12Jul 10, 2023Updated 2 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Resin.io device to bridging the wifi network to ethernet☆43May 2, 2017Updated 8 years ago
- ESP32 based version of WireShark compatible nRF24/RFM7x packet sniffer☆12May 2, 2020Updated 5 years ago
- Nethermind documentation☆10Jan 27, 2026Updated 2 weeks ago