Captive wifi hotspot bypass tool for Linux
☆67Jan 17, 2019Updated 7 years ago
Alternatives and similar repositories for anubis
Users that are interested in anubis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Run interactive android exploits in linux.☆149Feb 11, 2025Updated last year
- pentesting tool for noob hackers.Runs on linux and termux☆69Sep 2, 2021Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Apr 9, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- P2P cryto-currency with dashpay and blackcoin Hybird feature☆12Feb 28, 2022Updated 4 years ago
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago
- Its like airgeddon but better!☆61Jul 27, 2024Updated last year
- ☆11Nov 5, 2022Updated 3 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- PCSX2 UWP - The Playstation 2 Emulator for Xbox One/PC☆12May 16, 2020Updated 5 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- A port of Rack for the JavaScript JSGI web server interface☆36Oct 14, 2010Updated 15 years ago
- ☆16Dec 17, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A collection of android Exploits and Hacks☆977Oct 8, 2019Updated 6 years ago
- A Ghidra script to aid reverse engineering of Android native (.so) libraries, by identifying dynamically registered functions within the …☆16Feb 27, 2024Updated 2 years ago
- DLInjector for Graphical User Interface.☆35Jan 28, 2021Updated 5 years ago
- This is a wallet analysis tool designed for building and testing strategies. It comes with powerful features, including: 🧨Exporting PnL …☆15Oct 13, 2025Updated 6 months ago
- Tool to dump cisco device configs via snmp and/or add new users☆13Apr 8, 2026Updated last week
- Repository to gather the .NET malware I will be developing☆17Mar 7, 2026Updated last month
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Movement Detector using python☆10Jan 5, 2021Updated 5 years ago
- ☆11Mar 2, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 8 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆22Oct 31, 2018Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆15Dec 29, 2025Updated 3 months ago
- Handshake cracker☆53May 6, 2023Updated 2 years ago
- A Router WiFi key recovery/cracking tool with a twist.☆92Nov 2, 2018Updated 7 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- A sample web application with Clickjacking vulnerabilities and its attacker website.☆12Feb 10, 2022Updated 4 years ago
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆12Oct 26, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- ☆17Apr 5, 2021Updated 5 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Python scripts to maintain Monero opennodes DNS records☆19Mar 10, 2024Updated 2 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- A chat application with end to end encryption with centralized authentication system using Raspberry pi and a 4x4 Matrix Keypad for secur…☆13Mar 21, 2023Updated 3 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63May 29, 2023Updated 2 years ago