FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.
☆2,266Dec 18, 2021Updated 4 years ago
Alternatives and similar repositories for FruityWifi
Users that are interested in FruityWifi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,155Apr 18, 2020Updated 6 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,098Aug 21, 2018Updated 7 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,368Aug 12, 2024Updated last year
- 📡 A python program to create a fake AP and sniff data.☆1,693Nov 3, 2019Updated 6 years ago
- The Rogue Access Point Framework☆14,562Feb 4, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- wireless hacking - This is automated wireless hacking tool☆1,280Oct 27, 2022Updated 3 years ago
- Inject code and spy on wifi users☆2,621Jul 31, 2021Updated 4 years ago
- A framework for wireless pentesting.☆1,236Oct 14, 2020Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆3,639Aug 28, 2018Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- WarBerryPi - Tactical Exploitation☆2,221Nov 9, 2019Updated 6 years ago
- Continuously jam all wifi clients/routers☆4,242Jul 20, 2024Updated last year
- Sniffs sensitive data from interface or pcap☆1,831Nov 2, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,324Sep 1, 2021Updated 4 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Sep 21, 2018Updated 7 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆258Nov 19, 2017Updated 8 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,464Nov 26, 2018Updated 7 years ago
- Exploitation Framework for Embedded Devices☆13,105Updated this week
- Porting the Pineapple to the Raspberry Pi☆85Jun 27, 2013Updated 12 years ago
- Wireless Auditing, Intrusion Detection & Prevention System☆518Oct 22, 2017Updated 8 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆872Aug 4, 2017Updated 8 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,975Mar 22, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆594Mar 3, 2022Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- SpeedPhishing Framework☆449Aug 8, 2019Updated 6 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,482Sep 22, 2024Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,835Jan 19, 2020Updated 6 years ago
- Network Infrastructure Penetration Testing Tool☆1,671Jun 2, 2021Updated 4 years ago
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆2,529Aug 26, 2020Updated 5 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,511Sep 22, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,281Nov 20, 2025Updated 5 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,862Apr 29, 2026Updated last week
- A swiss army knife for pentesting networks☆9,126Dec 6, 2023Updated 2 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,390Jun 17, 2022Updated 3 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,863Jun 28, 2024Updated last year
- ☆3,498Dec 25, 2024Updated last year
- Efficient and advanced man in the middle framework☆2,180Mar 23, 2023Updated 3 years ago