xdavidhu / lanGhostLinks
π» A LAN dropbox chatbot controllable via Telegram
β359Updated 5 years ago
Alternatives and similar repositories for lanGhost
Users that are interested in lanGhost are comparing it to the libraries listed below
Sorting:
- Generate Payloads and Control Remote Machines. [Discontinued]β223Updated 4 years ago
- WiFi-autopwner: script to automate searching and auditing Wi-Fi networks with weak securityβ248Updated 6 years ago
- Pastejacking - PasteZortβ84Updated 6 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. Thisβ¦β290Updated 7 years ago
- Find your wireless network password in Windows , Linux and Mac OSβ353Updated 4 years ago
- The best DOS Tool Out There!β21Updated 9 years ago
- Chat with hacker assistantβ194Updated 7 years ago
- π· A lightning fast multithreaded network scanner framework with modules.β324Updated 5 years ago
- The Hacker's ToolBoxβ188Updated 8 years ago
- An (un-)ethical hacking-station based on Raspberry Pi and Pythonβ212Updated 7 years ago
- Advanced Hash Manipulationβ177Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ372Updated 2 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.β268Updated 11 years ago
- 3WiFi Wireless Databaseβ253Updated 2 years ago
- Inject malicious code into *.debsβ279Updated 3 years ago
- War Child denial of service testing suiteβ123Updated 8 years ago
- Remote administration service which uses twitter as a command and control serverβ715Updated 4 years ago
- Cloak can backdoor any python script with some tricks.β498Updated 6 years ago
- β205Updated 3 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.β434Updated 7 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β236Updated 4 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and wβ¦β315Updated 2 years ago
- Linux bash script automation for metasploitβ265Updated 6 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.ioβ163Updated 3 years ago
- Exploit Netwave and GoAhead IP Cameraβ246Updated 7 years ago
- A script written lazily for generating cross-platform backdoors on the go :)β190Updated 6 years ago
- Script to identify hosts vulnerable to CVE-2018-10933β231Updated 6 years ago
- WPS hacking scriptsβ280Updated last year
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.β138Updated 5 years ago
- Automated DeAuth attackβ313Updated last year