xdavidhu / lanGhostLinks
π» A LAN dropbox chatbot controllable via Telegram
β355Updated 6 years ago
Alternatives and similar repositories for lanGhost
Users that are interested in lanGhost are comparing it to the libraries listed below
Sorting:
- Generate Payloads and Control Remote Machines. [Discontinued]β225Updated 4 years ago
- WiFi-autopwner: script to automate searching and auditing Wi-Fi networks with weak securityβ254Updated 6 years ago
- Pastejacking - PasteZortβ83Updated 6 years ago
- The best DOS Tool Out There!β22Updated 9 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.β271Updated 11 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β244Updated 5 years ago
- 3WiFi Wireless Databaseβ260Updated 3 years ago
- Chat with hacker assistantβ195Updated 8 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. Thisβ¦β290Updated 8 years ago
- Find your wireless network password in Windows , Linux and Mac OSβ356Updated 5 years ago
- Remote administration service which uses twitter as a command and control serverβ717Updated 4 years ago
- π· A lightning fast multithreaded network scanner framework with modules.β321Updated 6 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.β138Updated 6 years ago
- Exploit Netwave and GoAhead IP Cameraβ247Updated 7 years ago
- An (un-)ethical hacking-station based on Raspberry Pi and Pythonβ217Updated 8 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ373Updated 2 years ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device removaβ¦β130Updated 8 years ago
- WiFi Pineapple DIYβ79Updated 8 years ago
- Linux bash script automation for metasploitβ270Updated 6 years ago
- π Modular web based pentesting interface. Designed to run on Pi devices!β70Updated 6 years ago
- Advanced Hash Manipulationβ175Updated 6 years ago
- Powershell Reverse Rubber Duckyβ57Updated 10 years ago
- The Hacker's ToolBoxβ191Updated 8 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and wβ¦β318Updated 3 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ361Updated 4 months ago
- Script to identify hosts vulnerable to CVE-2018-10933β232Updated 7 years ago
- A script written lazily for generating cross-platform backdoors on the go :)β190Updated 7 years ago
- Detect, capture, crack WPA/2 handshakes, WEP Keys and geotag with Android GPSβ202Updated 10 years ago
- WPS hacking scriptsβ283Updated last year
- War Child denial of service testing suiteβ121Updated 8 years ago