π» A LAN dropbox chatbot controllable via Telegram
β355Nov 3, 2019Updated 6 years ago
Alternatives and similar repositories for lanGhost
Users that are interested in lanGhost are comparing it to the libraries listed below
Sorting:
- π A small tool for displaying the WiFi traffic around you in the terminal.β18Nov 3, 2019Updated 6 years ago
- π· A lightning fast multithreaded network scanner framework with modules.β322Nov 3, 2019Updated 6 years ago
- This is a fast script to deauth all, a network or target with a built in oui lookup tool.β19Jul 8, 2018Updated 7 years ago
- π‘ A python program to create a fake AP and sniff data.β1,691Nov 3, 2019Updated 6 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.β12Jun 4, 2018Updated 7 years ago
- Example FaaS stack for Raspberry Pi (ARM) to integrate with Github events.β10Mar 31, 2017Updated 8 years ago
- ππ‘πMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN β¦β556Feb 1, 2020Updated 6 years ago
- Perform advanced MiTM attacks on websites with ease πβ682Mar 25, 2024Updated last year
- PoC tool to demonstrate vulnerabilities in wireless input devicesβ86Mar 24, 2017Updated 8 years ago
- β11Aug 2, 2017Updated 8 years ago
- Avoidz tool to bypass most A.V softwaresβ139Sep 28, 2017Updated 8 years ago
- A payload stager using PowerShellβ183Dec 15, 2019Updated 6 years ago
- Detect whether a site is running behind Cloudflare.β24Jun 16, 2024Updated last year
- Tool to identify all domains contained in an IP anonymouslyβ15Jun 4, 2017Updated 8 years ago
- python packet snifferβ11Jan 25, 2018Updated 8 years ago
- Listing subdomains about a main domainβ59May 9, 2018Updated 7 years ago
- β524Aug 11, 2023Updated 2 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcerβ52Sep 19, 2018Updated 7 years ago
- β25May 9, 2021Updated 4 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ373Apr 27, 2023Updated 2 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.β1,322Sep 1, 2021Updated 4 years ago
- Malduino Elite firmwareβ46May 31, 2017Updated 8 years ago
- Magnetic stripe spoofer implementing audio waves.β40Jan 7, 2017Updated 9 years ago
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β256Sep 21, 2018Updated 7 years ago
- β26Apr 5, 2020Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)β190Oct 16, 2018Updated 7 years ago
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Androidβ2,515Aug 26, 2020Updated 5 years ago
- WiFi Enabled USB Rubber Duckyβ152Dec 17, 2016Updated 9 years ago
- FROM BEGINNER TO ADVANCED FOR ALL SECURITY ENTHUSIASTS.β18Mar 23, 2018Updated 7 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect punyβ¦β81Nov 30, 2018Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.β601Jul 18, 2021Updated 4 years ago
- π Modular web based pentesting interface. Designed to run on Pi devices!β70Jan 3, 2019Updated 7 years ago
- Express security essentials deployment for Linux Serversβ60Oct 19, 2020Updated 5 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4β1,398May 5, 2021Updated 4 years ago
- Kicks out everyone in your LAN via with an enc28j60 ethernet controller and Arduino.β284Jan 6, 2018Updated 8 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.β72Jan 21, 2019Updated 7 years ago
- NSE-script for brute force open portsβ27Jun 14, 2015Updated 10 years ago
- Automated reconnaissance wrapper β TomNomNom's meg on steroids. [DEPRECATED]β305Oct 14, 2018Updated 7 years ago
- Phishing Toolkitβ19Feb 20, 2018Updated 8 years ago