xtr4nge / FruityWifiLinks
FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.
☆2,253Updated 3 years ago
Alternatives and similar repositories for FruityWifi
Users that are interested in FruityWifi are comparing it to the libraries listed below
Sorting:
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,100Updated 7 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,145Updated 5 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,688Updated 6 years ago
- wireless hacking - This is automated wireless hacking tool☆1,273Updated 3 years ago
- Inject code and spy on wifi users☆2,609Updated 4 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,769Updated last year
- An offline Wi-Fi Protected Setup brute-force utility☆1,689Updated 2 years ago
- Network Attack Tool☆1,486Updated 2 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆590Updated 3 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,216Updated 5 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆1,371Updated 4 years ago
- A framework for wireless pentesting.☆1,223Updated 5 years ago
- ☆1,892Updated last month
- Continuously jam all wifi clients/routers☆4,183Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,414Updated last year
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆870Updated 6 years ago
- Evil Twin Attack Bash script☆570Updated 9 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆867Updated 8 years ago
- The famous WPA precomputed cracker, Migrated from Google.☆1,107Updated last year
- Framework for Man-In-The-Middle attacks☆3,629Updated 7 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,241Updated 7 years ago
- Efficient and advanced man in the middle framework☆2,149Updated 2 years ago
- ☆3,561Updated 3 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆552Updated 5 years ago
- WarBerryPi - Tactical Exploitation☆2,225Updated 6 years ago
- Encoding Tools for Rubber Ducky☆441Updated last year
- Phison 2251-03 (2303) Custom Firmware & Existing Firmware Patches (BadUSB)☆4,164Updated 4 years ago
- Kali Linux ARM build scripts☆912Updated 6 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,254Updated 8 years ago
- ☆564Updated 2 years ago