wi-fi-analyzer / 3vilTwinAttacker
☆56Updated 4 years ago
Alternatives and similar repositories for 3vilTwinAttacker:
Users that are interested in 3vilTwinAttacker are comparing it to the libraries listed below
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Wifi sniffing and hijacking tool☆74Updated 10 years ago
- Trying to be the best tool to search for exploits in the terminal.☆19Updated 2 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 6 years ago
- Massive arsenal of hacker tools...☆77Updated 7 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆124Updated 5 years ago
- The Metasploit GUI☆88Updated 8 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- Autosploit = Automating Metasploit Modules.☆76Updated 5 years ago
- A python tool that will extract exif data from picture with two methods☆37Updated 3 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Updated 6 years ago
- POC for injecting Metasploit payloads on arbitrary APKs☆66Updated 8 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆35Updated 8 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- hackpack to go with lazykali on menu application Kali Linux☆29Updated 10 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- Social Engineering Toys☆36Updated 9 years ago
- Simple Karma Attack☆67Updated 4 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆141Updated 8 years ago
- Gathering Email Information Tool☆36Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- Small backdoor using cookie.☆59Updated 8 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆32Updated 8 years ago