xdavidhu / lanGhostLinks
π» A LAN dropbox chatbot controllable via Telegram
β357Updated 5 years ago
Alternatives and similar repositories for lanGhost
Users that are interested in lanGhost are comparing it to the libraries listed below
Sorting:
- Generate Payloads and Control Remote Machines. [Discontinued]β222Updated 4 years ago
- WiFi-autopwner: script to automate searching and auditing Wi-Fi networks with weak securityβ249Updated 6 years ago
- Pastejacking - PasteZortβ84Updated 6 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. Thisβ¦β290Updated 7 years ago
- An (un-)ethical hacking-station based on Raspberry Pi and Pythonβ215Updated 7 years ago
- Remote administration service which uses twitter as a command and control serverβ715Updated 4 years ago
- π· A lightning fast multithreaded network scanner framework with modules.β323Updated 5 years ago
- The best DOS Tool Out There!β21Updated 9 years ago
- Find your wireless network password in Windows , Linux and Mac OSβ353Updated 4 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.β266Updated 11 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β237Updated 4 years ago
- Chat with hacker assistantβ196Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ372Updated 2 years ago
- 3WiFi Wireless Databaseβ254Updated 3 years ago
- Advanced Hash Manipulationβ176Updated 5 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.β435Updated 7 years ago
- The Hacker's ToolBoxβ188Updated 8 years ago
- Exploit Netwave and GoAhead IP Cameraβ246Updated 7 years ago
- War Child denial of service testing suiteβ123Updated 8 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and wβ¦β315Updated 2 years ago
- Automated DeAuth attackβ312Updated last year
- Cloak can backdoor any python script with some tricks.β499Updated 6 years ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device removaβ¦β130Updated 8 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.β138Updated 5 years ago
- β205Updated 3 years ago
- π A tool for sniffing unencrypted wireless probe requests from devices.β336Updated 5 years ago
- Inject malicious code into *.debsβ278Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β441Updated 8 years ago
- Python logger with multiple features.β525Updated 4 years ago
- A script written lazily for generating cross-platform backdoors on the go :)β190Updated 6 years ago