sud0nick / CursedScreechLinks
A mass communicator module for the WiFi Pineapple that utilizes TLS to control a botnet of compromised systems.
☆15Updated 5 years ago
Alternatives and similar repositories for CursedScreech
Users that are interested in CursedScreech are comparing it to the libraries listed below
Sorting:
- giskismet – Wireless recon visualization tool☆55Updated 9 years ago
- An Raspberry PI 2 OpenWRT Image Setup To Be A Wireless Hacking Sandbox☆38Updated 10 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- ☆24Updated 9 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆37Updated 4 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Updated 7 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 4 years ago
- Get clients and access points.☆48Updated 6 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago
- Wi-Fi Backdoors☆40Updated 10 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Black Nurse DOS attack☆70Updated 8 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- Docker images for learning wifi hacking☆69Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- hostapd-mana - build-files, and installation-files for OpenWRT☆33Updated 4 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Updated 4 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 10 years ago
- A few transforms and a machine for parsing Nmap XML results☆39Updated 9 years ago
- Search bing with python☆12Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Updated 9 years ago