sundaysec / anubisLinks
Captive wifi hotspot bypass tool for Linux
☆64Updated 6 years ago
Alternatives and similar repositories for anubis
Users that are interested in anubis are comparing it to the libraries listed below
Sorting:
- wifi attacks suite☆59Updated 5 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆110Updated 7 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆90Updated 6 years ago
- Refluxion -- MITM WPA attacks tool☆38Updated 5 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Package manager for hackers built by hackers☆36Updated 7 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆74Updated 6 years ago
- Linset is a WPA/WPA2 phishing tool (evil twin)☆143Updated 2 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Updated 9 years ago
- Simple Karma Attack☆68Updated 5 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆81Updated 5 years ago
- Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks☆58Updated 7 years ago
- POC for injecting Metasploit payloads on arbitrary APKs☆65Updated 8 years ago
- Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆153Updated 6 years ago
- bluesnarfing proof-of-concept tool.☆56Updated 9 years ago
- python remote access trojan☆38Updated 8 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆18Updated 11 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆76Updated 3 years ago
- A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.☆56Updated 9 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Updated 7 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆27Updated 8 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆78Updated 7 years ago
- The router hacking repo.☆34Updated 10 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Updated 6 years ago
- Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android☆109Updated 5 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆163Updated last year
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 8 years ago