Make a Fake wireless access point aka Evil Twin....Easily!!
☆71Apr 22, 2023Updated 2 years ago
Alternatives and similar repositories for Rudrastra
Users that are interested in Rudrastra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆18May 2, 2024Updated last year
- Advanced management and deployment toolkit for SketchUp Pro. Automates extension synchronization, Ruby API environment setup, and asset l…☆57Updated this week
- Will disable windows defender at first and then run PowerShell as administrator to run the download code.☆13Sep 20, 2021Updated 4 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆58Sep 22, 2022Updated 3 years ago
- ☆19Dec 15, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple RAT in C#☆27Apr 11, 2020Updated 6 years ago
- Enable Monitor mode & Packet Injection in Raspberry Pi☆26Nov 13, 2021Updated 4 years ago
- A GUI version of the PhoneSpoit CLI tool.☆19Jan 15, 2025Updated last year
- ☆12Mar 4, 2023Updated 3 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Enhanced functions and new features for airgeddon!☆119Mar 1, 2026Updated last month
- WiFi Evil Twin Attack - Credential Harvest Tool☆16Dec 2, 2025Updated 4 months ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- Beef Over AWS is a tool that allows you to use Beef-XSS over WAN securly and anonymously.☆39Oct 4, 2021Updated 4 years ago
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 5 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- This is the only script to bind payload in termux within a matter of seconds. Now has Port Forwarding feature☆16Jun 11, 2019Updated 6 years ago
- Just another manual about installing NetHunter on your mobile phone☆28Jan 8, 2020Updated 6 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Updated version of panoptyks 2022 guerilla guide☆15Dec 7, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple Python3 port scanner☆15Dec 17, 2020Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- Its like airgeddon but better!☆61Jul 27, 2024Updated last year
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Jan 8, 2022Updated 4 years ago
- Hack vulnerable Wi-Fi networks using Termux (rooted)☆12Oct 11, 2023Updated 2 years ago
- ./kumasia php simple backdoor☆22Jul 6, 2025Updated 9 months ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- Realtek rtl8723de Ubuntu 18.04, 18.10 and older driver☆19Sep 27, 2025Updated 6 months ago
- Configure kali 2020.4 headless/headed for RPi4b☆15Jan 28, 2021Updated 5 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago