Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.
☆68Sep 9, 2015Updated 10 years ago
Alternatives and similar repositories for WiFi-Rifle
Users that are interested in WiFi-Rifle are comparing it to the libraries listed below
Sorting:
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Nov 24, 2014Updated 11 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Harbinger Sensor Network Project☆13Jun 8, 2015Updated 10 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Mainframe bruter and screen automation utility.☆43Sep 28, 2014Updated 11 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Sniff Wifi traffic, log device addresses.☆114Sep 21, 2021Updated 4 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- A lightweight Wi-Fi auto deauthentication attack tool (libtins/C++)☆37Oct 18, 2016Updated 9 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Mar 11, 2018Updated 7 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- The Bi-directional Link Extractor.☆53Apr 20, 2017Updated 8 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- Drag and Drop ClickJacking PoC development assistance tool.☆196Oct 1, 2020Updated 5 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆32Apr 8, 2019Updated 6 years ago
- Transparent and scalable SSL/TLS interception☆30Jul 13, 2015Updated 10 years ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆445Mar 5, 2017Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- PowerShell_Popup☆33Feb 10, 2015Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,097Aug 21, 2018Updated 7 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Nov 10, 2019Updated 6 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆245Nov 23, 2020Updated 5 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆501Nov 17, 2022Updated 3 years ago