wifiphisher / extra-phishing-pagesView external linksLinks
Community-built scenarios for Wifiphisher
☆379Apr 27, 2021Updated 4 years ago
Alternatives and similar repositories for extra-phishing-pages
Users that are interested in extra-phishing-pages are comparing it to the libraries listed below
Sorting:
- Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not b…☆14Jul 3, 2017Updated 8 years ago
- Wifiphisher's official site☆37Apr 27, 2021Updated 4 years ago
- Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.☆186Apr 27, 2021Updated 4 years ago
- Python wireless library for Linux.☆44Jun 16, 2022Updated 3 years ago
- A collection of captive portals for phishing using a WiFi Pineapple☆1,198May 27, 2024Updated last year
- The Rogue Access Point Framework☆14,420Feb 4, 2025Updated last year
- Evil Portal for the Wifi Pineapple Nano and Wifi Pineapple Tetra☆133Jun 2, 2020Updated 5 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Wifiphisher wifi connect template modified for Wifi Pineapple evilportal module☆11Feb 7, 2017Updated 9 years ago
- Evil Portal infusion for the wifi pineapple☆17May 13, 2018Updated 7 years ago
- Templates for the King Phisher open source phishing campaign toolkit.☆176Sep 18, 2019Updated 6 years ago
- Using Social Engineering To Obtain WiFi Passwords☆102Jan 12, 2018Updated 8 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- Credential phishing using Android Hotspot Captive Portals☆28Aug 14, 2024Updated last year
- Phishing Campaign Toolkit☆2,505Jul 29, 2025Updated 6 months ago
- Future Of Phishing With less delay☆1,038Oct 16, 2022Updated 3 years ago
- A Phishing WIFI Rogue Captive Portal!☆43Feb 12, 2019Updated 7 years ago
- Python tool for phishing☆257Apr 13, 2024Updated last year
- Phishing Tool & Information Collector☆4,658Oct 29, 2024Updated last year
- PhishX - The Complete Spear Phishing Tool☆110Sep 13, 2018Updated 7 years ago
- Paypal phishing tool☆30Jul 1, 2018Updated 7 years ago
- ☆17Sep 27, 2022Updated 3 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆26Jul 28, 2018Updated 7 years ago
- Phishing toolkit for red teams and pentesters.☆126Jun 1, 2018Updated 7 years ago
- Generate Professional Phishing Emails Fast And Easy☆1,365May 1, 2025Updated 9 months ago
- Chrome Keylogger Extension | Post Exploitation Tool☆438Apr 26, 2022Updated 3 years ago
- Python wireless library for Linux☆99Aug 21, 2022Updated 3 years ago
- Extra captive portals for captiveflask plugins of wifipumpkin3☆53Mar 14, 2024Updated last year
- ☆231Nov 20, 2019Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,246Mar 9, 2020Updated 5 years ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆649Oct 15, 2022Updated 3 years ago
- Fluxion is a remake of linset by vk496 with enhanced functionality.☆5,581Dec 13, 2025Updated 2 months ago
- Enhanced functions and new features for airgeddon!☆117Nov 3, 2025Updated 3 months ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,067Jan 15, 2021Updated 5 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Sep 21, 2018Updated 7 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,457Sep 22, 2024Updated last year
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆144Jul 12, 2020Updated 5 years ago