rpp0 / scapy-fakeapLinks
Fake wireless Access Point (AP) implementation using Python and Scapy, intended for convenient testing of 802.11 protocols and implementations.
☆248Updated 10 years ago
Alternatives and similar repositories for scapy-fakeap
Users that are interested in scapy-fakeap are comparing it to the libraries listed below
Sorting:
- SSLStrip version to defeat HSTS☆322Updated 8 years ago
- A python implementation of airodump-ng☆82Updated 3 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆141Updated 3 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆272Updated 11 years ago
- NTP Main-in-the-Middle tool☆248Updated 3 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Updated 9 years ago
- BadUSB 2.0 USB-HID MiTM POC☆288Updated 9 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆256Updated 8 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆150Updated 10 years ago
- WPS related utilities☆166Updated 10 years ago
- ☆124Updated 9 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆593Updated 3 years ago
- A Simple ARP Spoofer using Scapy☆108Updated 10 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Updated 9 years ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆445Updated 8 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆143Updated 7 years ago
- Modified hostapd to facilitate AP impersonation attacks☆517Updated 7 years ago
- wifitap updated for BT5r3☆152Updated 8 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆76Updated 8 years ago
- a MITM attack tool☆85Updated 10 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆244Updated 5 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆178Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆203Updated 9 years ago
- ☆482Updated 2 months ago
- Mallory - MiTM TCP and UDP Proxy☆322Updated 3 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆156Updated 7 years ago
- A Software Defined Radio Attack Tool☆547Updated 11 months ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Updated 6 years ago