Make a Fake wireless access point aka Evil Twin....Easily!!
☆71Apr 22, 2023Updated 2 years ago
Alternatives and similar repositories for Rudrastra
Users that are interested in Rudrastra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Will disable windows defender at first and then run PowerShell as administrator to run the download code.☆13Sep 20, 2021Updated 4 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆57Sep 22, 2022Updated 3 years ago
- ☆19Dec 15, 2018Updated 7 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- Enable Monitor mode & Packet Injection in Raspberry Pi☆26Nov 13, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A GUI version of the PhoneSpoit CLI tool.☆18Jan 15, 2025Updated last year
- Setup a AES Encrypted communication Between two machines Right from terminal☆17Sep 2, 2021Updated 4 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Enhanced functions and new features for airgeddon!☆118Mar 1, 2026Updated 3 weeks ago
- WiFi Evil Twin Attack - Credential Harvest Tool☆16Dec 2, 2025Updated 3 months ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- Beef Over AWS is a tool that allows you to use Beef-XSS over WAN securly and anonymously.☆39Oct 4, 2021Updated 4 years ago
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 5 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- This is the only script to bind payload in termux within a matter of seconds. Now has Port Forwarding feature☆16Jun 11, 2019Updated 6 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Updated version of panoptyks 2022 guerilla guide☆15Dec 7, 2023Updated 2 years ago
- Simple Python3 port scanner☆15Dec 17, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- Its like airgeddon but better!☆60Jul 27, 2024Updated last year
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- An Bangladeshi Fast Free Fire Phishing Apk☆10Aug 26, 2022Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆17Jan 8, 2022Updated 4 years ago
- Hack vulnerable Wi-Fi networks using Termux (rooted)☆12Oct 11, 2023Updated 2 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- Second Edition Metasploit For Termux☆21Oct 30, 2017Updated 8 years ago
- Configure kali 2020.4 headless/headed for RPi4b☆15Jan 28, 2021Updated 5 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 5 years ago