sud0nick / CursedScreechLinks
A mass communicator module for the WiFi Pineapple that utilizes TLS to control a botnet of compromised systems.
☆15Updated 5 years ago
Alternatives and similar repositories for CursedScreech
Users that are interested in CursedScreech are comparing it to the libraries listed below
Sorting:
- Get clients and access points.☆48Updated 6 years ago
- giskismet – Wireless recon visualization tool☆55Updated 9 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- An Raspberry PI 2 OpenWRT Image Setup To Be A Wireless Hacking Sandbox☆39Updated 10 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Updated 7 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Updated 4 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆37Updated 4 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Updated 7 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆78Updated 7 years ago
- Black Nurse DOS attack☆70Updated 8 years ago
- Password cracking utility☆54Updated 4 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Updated 9 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 8 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- ☆24Updated 10 years ago
- Simple Karma Attack☆68Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆15Updated 7 years ago
- lulz: automated webstalking tool☆54Updated 9 years ago
- Vulnerability Scanner☆11Updated 11 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- Search bing with python☆12Updated 11 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Updated 8 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Updated 9 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago