rsmusllp / termineterLinks
Smart Meter Security Testing Framework
☆265Updated 10 months ago
Alternatives and similar repositories for termineter
Users that are interested in termineter are comparing it to the libraries listed below
Sorting:
- NTP Main-in-the-Middle tool☆246Updated 3 years ago
- Wireless Probe Requests Sniffer☆189Updated 2 years ago
- ☆223Updated last year
- Framework for Man-In-The-Middle attacks☆187Updated 8 years ago
- Wiegotcha: Long Range RFID Thief☆234Updated 3 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆254Updated 6 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Reliable Teensy Penetration Testing Payload☆179Updated 12 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆234Updated 4 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- Stargate☆95Updated 8 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆172Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 7 years ago
- HID attack payload generator for Arduinos☆165Updated last year
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆144Updated 9 years ago
- Porting the Pineapple to the Raspberry Pi☆84Updated 12 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆140Updated 6 years ago
- KeySniffer device discovery tools and public advisories☆119Updated 8 years ago
- Protect your Wireless Network from Evil Access Points!☆182Updated 2 years ago
- Car Backdoor Maker☆220Updated 6 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 8 years ago
- This is the Command & Control component of the PlugBot project☆102Updated 3 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 9 months ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆137Updated 9 years ago
- Duct Tape Command and Control!☆96Updated this week
- myBFF - a Brute Force Framework☆140Updated 4 months ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- SSLStrip version to defeat HSTS☆318Updated 7 years ago
- ☆106Updated 9 years ago
- ☆150Updated 2 years ago