xtr4nge / FruityWifiView external linksLinks
FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.
β2,260Dec 18, 2021Updated 4 years ago
Alternatives and similar repositories for FruityWifi
Users that are interested in FruityWifi are comparing it to the libraries listed below
Sorting:
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3β3,148Apr 18, 2020Updated 5 years ago
- π‘ A python program to create a fake AP and sniff data.β1,691Nov 3, 2019Updated 6 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitMβ1,098Aug 21, 2018Updated 7 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.β4,347Aug 12, 2024Updated last year
- Inject code and spy on wifi usersβ2,615Jul 31, 2021Updated 4 years ago
- The Rogue Access Point Frameworkβ14,420Feb 4, 2025Updated last year
- A framework for wireless pentesting.β1,228Oct 14, 2020Updated 5 years ago
- wireless hacking - This is automated wireless hacking toolβ1,281Oct 27, 2022Updated 3 years ago
- Framework for Man-In-The-Middle attacksβ3,637Aug 28, 2018Updated 7 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercapβ2,494Feb 27, 2018Updated 7 years ago
- Sniffs sensitive data from interface or pcapβ1,811Nov 2, 2023Updated 2 years ago
- WarBerryPi - Tactical Exploitationβ2,225Nov 9, 2019Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managedβ¦β208Dec 4, 2017Updated 8 years ago
- Continuously jam all wifi clients/routersβ4,214Jul 20, 2024Updated last year
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.β870Aug 4, 2017Updated 8 years ago
- Undetectable Windows Payload Generationβ1,608Nov 8, 2022Updated 3 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and Cβ8,940Mar 22, 2024Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.β1,322Sep 1, 2021Updated 4 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing β¦β592Mar 3, 2022Updated 3 years ago
- Exploitation Framework for Embedded Devicesβ12,968Jun 10, 2025Updated 8 months ago
- π‘ππ Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)β256Sep 21, 2018Updated 7 years ago
- SpeedPhishing Frameworkβ448Aug 8, 2019Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environmentsβ1,212Sep 14, 2020Updated 5 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons coβ¦β6,441Nov 26, 2018Updated 7 years ago
- Empire is a PowerShell and Python post-exploitation agent.β7,798Jan 19, 2020Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the rβ¦β3,223Nov 20, 2025Updated 2 months ago
- Network Infrastructure Penetration Testing Toolβ1,670Jun 2, 2021Updated 4 years ago
- Wireless Auditing, Intrusion Detection & Prevention Systemβ520Oct 22, 2017Updated 8 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.β5,489Sep 22, 2024Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.β2,457Sep 22, 2024Updated last year
- NetRipper - Smart traffic sniffing for penetration testersβ1,384Jun 17, 2022Updated 3 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricksβ1,438Nov 3, 2018Updated 7 years ago
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Androidβ2,506Aug 26, 2020Updated 5 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.β1,865Jun 28, 2024Updated last year
- A swiss army knife for pentesting networksβ9,056Dec 6, 2023Updated 2 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automaticallyβ496Sep 21, 2021Updated 4 years ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ291May 14, 2019Updated 6 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.β500Aug 11, 2017Updated 8 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4β1,389May 5, 2021Updated 4 years ago