Captive Portal Evasion Tool
☆15Sep 4, 2016Updated 9 years ago
Alternatives and similar repositories for captiv8
Users that are interested in captiv8 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- A Simple Keylogger☆17Oct 1, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Asynchronous MSF RPC API wrapper☆21Dec 8, 2022Updated 3 years ago
- Python wireless library for Linux☆99Aug 21, 2022Updated 3 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- A radio frequency database☆12Jun 8, 2023Updated 2 years ago
- remote administrator framework☆22Aug 9, 2024Updated last year
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- [Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth to…☆29Oct 13, 2017Updated 8 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Macros for stratagem inputs in Helldivers 2☆15Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A CLI tool that scans through a directory and organizes all loose files into folders by file type.☆10Jul 27, 2021Updated 4 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- Zip brute is a python script that cracks zip that are password protected using a wordlist dictionary.☆23Jun 14, 2021Updated 4 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- Fb id clone commands☆21Jul 11, 2021Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Start a rogue access point with no effort, with support for hostapd, airbase, sslstrip, sslsplit, tcpdump builtin☆16Mar 8, 2016Updated 10 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- The real GPT-4 with image access (You probably don't have access)☆12Mar 17, 2023Updated 3 years ago
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Script to Send Multiple Messages from WhatsApp☆11May 18, 2019Updated 6 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated 3 months ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Mar 24, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- horrible awful fox that i hate. she crawls across your screen. click on her to make her explode.☆12May 30, 2024Updated last year
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Nov 6, 2016Updated 9 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆39Jan 24, 2020Updated 6 years ago
- IoD Bluetooth Sniffer rPi solution☆12Sep 25, 2019Updated 6 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago