Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.
☆44Feb 20, 2021Updated 5 years ago
Alternatives and similar repositories for Auto-Besside-Capturer
Users that are interested in Auto-Besside-Capturer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆28Jun 19, 2020Updated 5 years ago
- Correction and installation of WIFITE's HCX dependencies/Correção e instalação das dependências HCX do WIFITE☆13May 3, 2026Updated last week
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- Spy-Bot: A Cloud Penetration Testing Approach for Wireless Penetration Testing.☆18Nov 2, 2017Updated 8 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆18Oct 30, 2014Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng☆14Jan 1, 2019Updated 7 years ago
- Refluxion -- MITM WPA attacks tool☆40Jul 18, 2020Updated 5 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- Some scripts and stuff for wardriving and wifi hacks .... works great on kali and ubuntu 32 bit ...Reaver likes 32 bit binaries.☆27May 16, 2021Updated 4 years ago
- A bootrom exploit for MediaTek devices☆20Apr 25, 2023Updated 3 years ago
- Kali Linux on Raspberry PI 3, 3b+ Post Install☆15Nov 24, 2020Updated 5 years ago
- Brute force attack against WPS, that actually works☆47Jan 17, 2020Updated 6 years ago
- Distributed WPA PSK auditor☆359Apr 10, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python code to to compute PMKs, PTKs, and MICs given data from a WPA2 4-way handshake☆15Oct 29, 2017Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Feb 18, 2015Updated 11 years ago
- Wireless EMP (WEMP) - A simple shell script that kicks all devices off of a network for as long as desired☆35Feb 1, 2017Updated 9 years ago
- re-implements window.crypto.signText and exposes it to content☆11Aug 7, 2019Updated 6 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆103Jan 31, 2017Updated 9 years ago
- Xdos-server is a type of DDOS {Distributed Denial of Service} by sending as many bots as possible to flood the server until it goes down☆11Oct 16, 2025Updated 6 months ago
- Captive wifi hotspot bypass tool for Linux☆67Jan 17, 2019Updated 7 years ago
- Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)☆27Dec 8, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Sep 27, 2022Updated 3 years ago
- The repo for the ViruSafe Backend project.☆11Jan 21, 2022Updated 4 years ago
- ☆12Oct 5, 2025Updated 7 months ago
- WiFi- and Bluetooth devices overlayed on Google Maps. Sourced from WiGLE Android app / Aircrack-ng.☆96Dec 11, 2022Updated 3 years ago
- Nepali wordlist generator and filter for generating password for common patterns☆15Dec 11, 2025Updated 5 months ago
- Hack-camera is a tool used to carry out attacks using social engineering, namely sending a trap link to trap the target and taking photos…☆20Dec 24, 2025Updated 4 months ago
- Arduino code and Odroid-C1 (or Raspberry PI) python code to control TI cc1100 and cc1101 transceivers. Also known as: RF1100SE and RF110…☆13Feb 28, 2017Updated 9 years ago
- Distributing WPA hash cracking.☆22Dec 5, 2022Updated 3 years ago
- An AI agent that generates nice changelogs from git commits.☆15Mar 31, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automating SQL Injection in a list of URLs or Request Files☆12Aug 8, 2016Updated 9 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- Anonymous FTP Scanner Script- Generates IP's between two ranges, scans 21 and attempts a anonymous connection☆10Nov 23, 2014Updated 11 years ago
- hackpack to go with lazykali on menu application Kali Linux☆30Oct 23, 2014Updated 11 years ago
- cenarius tool for crack Wi-Fi , crack wpa-psk , crack wpa2-psk , crack wep , crack wps pin and crack hidden AP . cenarius psk crack☆32May 9, 2016Updated 10 years ago
- Small tool for sending 802.11 disassociation and deauthentication packets to specific clients.☆14Mar 16, 2015Updated 11 years ago
- Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks☆60May 6, 2018Updated 8 years ago