sensepost / Snoopy
Snoopy: A distributed tracking and data interception framework
☆598Updated 12 years ago
Alternatives and similar repositories for Snoopy:
Users that are interested in Snoopy are comparing it to the libraries listed below
- Snoopy v2.0 - modular digital terrestrial tracking framework☆434Updated 7 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆254Updated 7 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,246Updated 8 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,091Updated 6 years ago
- Create fake AP in Kali with 1 command☆268Updated 9 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆353Updated 9 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆579Updated 2 years ago
- This repository contains some bettercap transparent proxy example modules.☆282Updated 6 years ago
- SpeedPhishing Framework☆442Updated 5 years ago
- BadUSB 2.0 USB-HID MiTM POC☆283Updated 8 years ago
- ☆240Updated 8 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- Framework for Man-In-The-Middle attacks☆185Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,668Updated 5 years ago
- powerful auto-backdooring utility☆744Updated 7 years ago
- A malicious captive wifi portal☆142Updated 4 years ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆310Updated 5 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- A webshell framework for penetration testers.☆296Updated 10 months ago
- SSLStrip version to defeat HSTS☆316Updated 7 years ago
- Find your wireless network password in Windows , Linux and Mac OS☆344Updated 4 years ago
- WarBerryPi - Tactical Exploitation☆2,224Updated 5 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆222Updated 6 years ago
- 🔍 A tool for sniffing unencrypted wireless probe requests from devices.☆334Updated 5 years ago
- The Credential Mapper☆440Updated 7 years ago
- Modified hostapd to facilitate AP impersonation attacks☆501Updated 6 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆322Updated 5 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆995Updated 3 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,213Updated 3 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,103Updated 7 years ago