Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.
☆188Apr 27, 2021Updated 5 years ago
Alternatives and similar repositories for roguehostapd
Users that are interested in roguehostapd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python wireless library for Linux.☆46Jun 16, 2022Updated 3 years ago
- Community-built scenarios for Wifiphisher☆381Apr 27, 2021Updated 5 years ago
- Python wireless library for Linux☆100Aug 21, 2022Updated 3 years ago
- Wifiphisher's official site☆38Apr 27, 2021Updated 5 years ago
- The Rogue Access Point Framework☆14,592Feb 4, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- MiFlash tool☆14Sep 18, 2022Updated 3 years ago
- Unofficial xiaomi library☆18Jul 12, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- SensePost's modified hostapd for wifi attacks.☆610Aug 5, 2024Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,484Sep 22, 2024Updated last year
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A mirror of the original SSLstrip+ code by Leonardo Nve☆183Jun 29, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/wifuzz☆35Jun 17, 2015Updated 10 years ago
- CAFest nethunter kernel based on LA.UM.9.1.r1-11900-SMXXX0.0 with latest upstream-f2fs-stable-linux-4.14.y merged, bb and perf focused. |…☆31Apr 18, 2026Updated last month
- DNS2Proxy offensive proxy version for HSTS☆28Jan 1, 2018Updated 8 years ago
- Automated victim-customized phishing attacks against Wi-Fi clients☆76Jan 15, 2017Updated 9 years ago
- A proof of concept project to detect an stop Evil Twin Attacks.☆16Oct 3, 2019Updated 6 years ago
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 6 years ago
- Small tool to capture packets from wlan devices.☆2,135Updated this week
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆348Aug 1, 2024Updated last year
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- A wrapper for Nmap to quickly run network scans☆147Sep 23, 2020Updated 5 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- ☆48Jan 26, 2022Updated 4 years ago
- A5/3 Call Encryption Library☆32May 26, 2016Updated 9 years ago
- Xiaomi Service Tool Indonesia (xiaomi redmi note 3 pro toolkit) is an application created to solve existing software problems on a Qualco…☆36Sep 18, 2022Updated 3 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 8 months ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- Powerful framework for rogue access point attack.☆2,451Jan 9, 2024Updated 2 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆55Jul 23, 2024Updated last year
- ☆234Nov 20, 2019Updated 6 years ago
- Extra captive portals for captiveflask plugins of wifipumpkin3☆56Mar 14, 2024Updated 2 years ago