sensepost / SnoopyLinks
Snoopy: A distributed tracking and data interception framework
☆611Updated 13 years ago
Alternatives and similar repositories for Snoopy
Users that are interested in Snoopy are comparing it to the libraries listed below
Sorting:
- Snoopy v2.0 - modular digital terrestrial tracking framework☆445Updated 8 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆256Updated 8 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆593Updated 3 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,099Updated 7 years ago
- BadUSB 2.0 USB-HID MiTM POC☆288Updated 9 years ago
- SSLStrip version to defeat HSTS☆322Updated 8 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Updated 10 years ago
- Create fake AP in Kali with 1 command☆269Updated 10 years ago
- This repository contains some bettercap transparent proxy example modules.☆281Updated 7 years ago
- ☆253Updated 9 years ago
- powerful auto-backdooring utility☆751Updated 8 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆867Updated 8 years ago
- A web front-end for password cracking and analytics☆622Updated 4 years ago
- A fast and stealthy credential harvester☆629Updated 2 years ago
- Modified hostapd to facilitate AP impersonation attacks☆517Updated 7 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆356Updated 5 years ago
- The "bot" component of the PlugBot project☆277Updated 3 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,686Updated 6 years ago
- NTP Main-in-the-Middle tool☆248Updated 3 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,258Updated 8 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆501Updated 8 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆452Updated 7 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆528Updated 9 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Updated 3 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- The Credential Mapper☆448Updated 8 years ago
- Specify targets and run sets of tools against them☆386Updated 6 years ago
- 🔍 A tool for sniffing unencrypted wireless probe requests from devices.☆337Updated 6 years ago
- The WiFi Pineapple Wiki☆259Updated 6 years ago