Captive Portal Evasion Tool
☆15Sep 4, 2016Updated 9 years ago
Alternatives and similar repositories for captiv8
Users that are interested in captiv8 are comparing it to the libraries listed below
Sorting:
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Compare two nested Python data structure and pinpoint the first place they differ☆15Nov 19, 2015Updated 10 years ago
- A Simple Keylogger☆17Oct 1, 2018Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆21Dec 8, 2022Updated 3 years ago
- Python wireless library for Linux☆99Aug 21, 2022Updated 3 years ago
- A ddos tool for penetration of websites☆15Dec 13, 2020Updated 5 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- A radio frequency database☆11Jun 8, 2023Updated 2 years ago
- Instagram Bruteforce For Hacking Instagram Accounts☆17Apr 4, 2020Updated 5 years ago
- remote administrator framework☆22Aug 9, 2024Updated last year
- ☆21Jan 29, 2022Updated 4 years ago
- [Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth to…☆29Oct 13, 2017Updated 8 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Macros for stratagem inputs in Helldivers 2☆16Updated this week
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- Zip brute is a python script that cracks zip that are password protected using a wordlist dictionary.☆23Jun 14, 2021Updated 4 years ago
- A script to generate the Hackers Against Humanity deck.☆13Jan 21, 2024Updated 2 years ago
- Fb id clone commands☆21Jul 11, 2021Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Start a rogue access point with no effort, with support for hostapd, airbase, sslstrip, sslsplit, tcpdump builtin☆16Mar 8, 2016Updated 10 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- The real GPT-4 with image access (You probably don't have access)☆12Mar 17, 2023Updated 3 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Script to Send Multiple Messages from WhatsApp☆11May 18, 2019Updated 6 years ago
- Explanation with code exambles for NASA Jet Propulsion Lab's "The Power of 10: Rules for Developing Safety-Critical Code"☆15Jul 26, 2023Updated 2 years ago
- Multimodal encoder-only transformer model for image-based protein predictions☆15Dec 12, 2023Updated 2 years ago
- horrible awful fox that i hate. she crawls across your screen. click on her to make her explode.☆12May 30, 2024Updated last year
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆38Jan 24, 2020Updated 6 years ago
- IoD Bluetooth Sniffer rPi solution☆12Sep 25, 2019Updated 6 years ago
- ☆38Jan 6, 2018Updated 8 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago