Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.
☆187Apr 27, 2021Updated 4 years ago
Alternatives and similar repositories for roguehostapd
Users that are interested in roguehostapd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python wireless library for Linux.☆45Jun 16, 2022Updated 3 years ago
- Community-built scenarios for Wifiphisher☆380Apr 27, 2021Updated 4 years ago
- Python wireless library for Linux☆99Aug 21, 2022Updated 3 years ago
- Wifiphisher's official site☆38Apr 27, 2021Updated 4 years ago
- The Rogue Access Point Framework☆14,516Feb 4, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- MiFlash tool☆14Sep 18, 2022Updated 3 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- The main repository for ubuntu-core base snaps. It contains snaps from core22+.☆32Updated this week
- My bookmarks☆18Feb 4, 2026Updated last month
- ☆10Oct 11, 2020Updated 5 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- SensePost's modified hostapd for wifi attacks.☆603Aug 5, 2024Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,476Sep 22, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆183Jun 29, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/wifuzz☆35Jun 17, 2015Updated 10 years ago
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- CAFest nethunter kernel based on LA.UM.9.1.r1-11900-SMXXX0.0 with latest upstream-f2fs-stable-linux-4.14.y merged, bb and perf focused. |…☆30Mar 2, 2026Updated 3 weeks ago
- DNS2Proxy offensive proxy version for HSTS☆29Jan 1, 2018Updated 8 years ago
- A proof of concept project to detect an stop Evil Twin Attacks.☆17Oct 3, 2019Updated 6 years ago
- Mutation Of Vıruses☆49Dec 10, 2015Updated 10 years ago
- Small tool to capture packets from wlan devices.☆2,101Mar 10, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆342Aug 1, 2024Updated last year
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Jun 5, 2023Updated 2 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- ☆48Jan 26, 2022Updated 4 years ago
- A5/3 Call Encryption Library☆32May 26, 2016Updated 9 years ago
- Xiaomi Service Tool Indonesia (xiaomi redmi note 3 pro toolkit) is an application created to solve existing software problems on a Qualco…☆36Sep 18, 2022Updated 3 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- Powerful framework for rogue access point attack.☆2,412Jan 9, 2024Updated 2 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆55Jul 23, 2024Updated last year
- ☆234Nov 20, 2019Updated 6 years ago