trentgillis / deauth-detectorView external linksLinks
De-authentication attack detector that displays attack information via a React web application dashboard
☆19Dec 12, 2022Updated 3 years ago
Alternatives and similar repositories for deauth-detector
Users that are interested in deauth-detector are comparing it to the libraries listed below
Sorting:
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- WPA/WPA2 SECURITY HACK WITHOUT BRUTE FORCE☆16Mar 7, 2017Updated 8 years ago
- Interactive Arts 1; Installation & Immersive Environments - course repo. University of Montana, School of Media Arts☆14Aug 24, 2020Updated 5 years ago
- Pwnagotchi settings, config files and plugins☆29Jan 10, 2025Updated last year
- Powershell shellcode one-liner. Powershell免杀一句话上线器便捷生成☆54Aug 13, 2023Updated 2 years ago
- ☆29Jan 19, 2024Updated 2 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Decrypt VMProtect (.NET) obfuscated strings. Made by Cabbo with love.☆28May 5, 2023Updated 2 years ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆38Jul 28, 2024Updated last year
- ☆40Feb 23, 2016Updated 9 years ago
- Jupyter Notebook Praktikum Projects. This is repository with data analyst educational projects from Yandex.Praktikum.☆11Feb 21, 2021Updated 4 years ago
- WiFi Attacking Application With User Interface☆11Dec 11, 2022Updated 3 years ago
- ☆36Oct 1, 2024Updated last year
- Data exfiltration and covert communication tool☆39Jan 10, 2023Updated 3 years ago
- This Arduino sketch is used to control 2 DC motors and 2 optical encoders from printer head frame by step/ direction signals.☆12Sep 27, 2020Updated 5 years ago
- ☆12Sep 1, 2025Updated 5 months ago
- A super portable evil device, based on the ESP8266 board, running Micropython and equipped with a single button and a small OLED display☆70Jun 5, 2020Updated 5 years ago
- Wireless EMP (WEMP) - A simple shell script that kicks all devices off of a network for as long as desired☆34Feb 1, 2017Updated 9 years ago
- C64 playroutine identity scanner☆14Jan 9, 2026Updated last month
- an experimental simulation of a mechanical destination board known from Airports☆11Apr 30, 2017Updated 8 years ago
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago
- Python script with one simple purpose: to get all or any detailed informations about wifi networks on mac OS. I've written this tool as t…☆10Jul 1, 2019Updated 6 years ago
- A tool for monitoring the progress of data through a pipe.☆12Oct 31, 2025Updated 3 months ago
- An on screen keyboard for Firefox for those in a kiosk environment.☆12Apr 13, 2021Updated 4 years ago
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- OpenID Connect and OAuth 2.0 Framework for ASP .NET☆11Dec 14, 2025Updated 2 months ago
- ☆14Jul 26, 2017Updated 8 years ago
- How to hack webcams☆10Jan 7, 2022Updated 4 years ago
- ☆11Jan 22, 2021Updated 5 years ago
- Generates a Random User Profile☆12Mar 23, 2024Updated last year
- ☆14Apr 7, 2025Updated 10 months ago
- AGS Tool for translating games writen on Adventure Game Studio engine.☆12May 4, 2018Updated 7 years ago
- MiHome is an open source environmental sensor. It was designed to provide students and researchers a cheap and reliable data platform. Us…☆10Feb 25, 2023Updated 2 years ago
- Generate cross-platform sound intimations, push notifications and get a telegram message when a process execution is finished in the clou…☆16Feb 24, 2023Updated 2 years ago
- Telegram bot which helps in promoting Instagram accounts☆10Apr 13, 2020Updated 5 years ago
- Style transfer API for PHP: An example HTML webpage for neural style transfer using the Deep Art Effects API.☆12Jul 6, 2025Updated 7 months ago
- A dnSpyEx extension for DotNet Universal Patcher.☆12Nov 24, 2023Updated 2 years ago
- A self-hosted companion for your little toy "pwnagotchi" to get motivated to obtain more handshakes and learn more IT security. It puts y…