sensepost / SnoopyLinks
Snoopy: A distributed tracking and data interception framework
☆610Updated 13 years ago
Alternatives and similar repositories for Snoopy
Users that are interested in Snoopy are comparing it to the libraries listed below
Sorting:
- Snoopy v2.0 - modular digital terrestrial tracking framework☆445Updated 8 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆256Updated 8 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆593Updated 3 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,099Updated 7 years ago
- Wireless Probe Requests Sniffer☆190Updated 3 years ago
- BadUSB 2.0 USB-HID MiTM POC☆288Updated 9 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- Create fake AP in Kali with 1 command☆269Updated 10 years ago
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- SSLStrip version to defeat HSTS☆322Updated 8 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Updated 9 years ago
- This repository contains some bettercap transparent proxy example modules.☆281Updated 7 years ago
- ☆252Updated 9 years ago
- powerful auto-backdooring utility☆751Updated 8 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Updated 10 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Updated 8 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆867Updated 8 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Updated 6 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆451Updated 7 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,258Updated 8 years ago
- Automated Linux evil maid attack☆433Updated 10 years ago
- ☆135Updated 10 years ago
- A webshell framework for penetration testers.☆300Updated 4 months ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆320Updated 6 years ago
- The "bot" component of the PlugBot project☆277Updated 3 years ago
- The WiFi Pineapple Wiki☆259Updated 6 years ago
- A fast and stealthy credential harvester☆630Updated 2 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆356Updated 5 years ago