Community-built scenarios for Wifiphisher
☆381Apr 27, 2021Updated 5 years ago
Alternatives and similar repositories for extra-phishing-pages
Users that are interested in extra-phishing-pages are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not b…☆15Jul 3, 2017Updated 8 years ago
- Wifiphisher's official site☆38Apr 27, 2021Updated 5 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆188Apr 27, 2021Updated 5 years ago
- Python wireless library for Linux.☆46Jun 16, 2022Updated 3 years ago
- The Rogue Access Point Framework☆14,562Feb 4, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of captive portals for phishing using a WiFi Pineapple☆1,243May 27, 2024Updated last year
- Evil Portal for the Wifi Pineapple Nano and Wifi Pineapple Tetra☆134Jun 2, 2020Updated 5 years ago
- Evil Portal infusion for the wifi pineapple☆17May 13, 2018Updated 7 years ago
- Paypal phishing tool☆30Jul 1, 2018Updated 7 years ago
- Wifiphisher wifi connect template modified for Wifi Pineapple evilportal module☆11Feb 7, 2017Updated 9 years ago
- Templates for the King Phisher open source phishing campaign toolkit.☆175Sep 18, 2019Updated 6 years ago
- Future Of Phishing With less delay☆1,070Oct 16, 2022Updated 3 years ago
- Python wireless library for Linux☆100Aug 21, 2022Updated 3 years ago
- Phishing Campaign Toolkit☆2,535Apr 30, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- A Phishing WIFI Rogue Captive Portal!☆44Feb 12, 2019Updated 7 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Web server for controlling LED diodes with a NodeMCU (ESP8266)☆11Apr 26, 2020Updated 6 years ago
- Using Social Engineering To Obtain WiFi Passwords☆102Jan 12, 2018Updated 8 years ago
- This is Google Phishing page is created for knowledge purpose , And You should Add the Sql data links,☆35Oct 29, 2022Updated 3 years ago
- Extra captive portals for captiveflask plugins of wifipumpkin3☆55Mar 14, 2024Updated 2 years ago
- Credential phishing using Android Hotspot Captive Portals☆29Aug 14, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Sep 21, 2018Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- WiFi Password Evil Portal modified to work on the Wi-Fi Pineapple MK7☆37Aug 10, 2021Updated 4 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆58Sep 22, 2022Updated 3 years ago
- Enhanced functions and new features for airgeddon!☆122Mar 1, 2026Updated 2 months ago
- Fluxion is a remake of linset by vk496 with enhanced functionality.☆5,684Apr 3, 2026Updated last month
- Phishing Tool & Information Collector☆4,719Oct 29, 2024Updated last year
- Python tool for phishing☆271Apr 13, 2024Updated 2 years ago
- Generate Professional Phishing Emails Fast And Easy☆1,390May 1, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,091Sep 16, 2025Updated 7 months ago
- A library of pretexts to use on offensive phishing engagements.☆391Aug 9, 2019Updated 6 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,257Mar 9, 2020Updated 6 years ago
- Phishing Tool☆24Feb 19, 2018Updated 8 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,481Sep 22, 2024Updated last year
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆655Oct 15, 2022Updated 3 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago