xtr4nge / FruityWifiLinks
FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.
☆2,246Updated 3 years ago
Alternatives and similar repositories for FruityWifi
Users that are interested in FruityWifi are comparing it to the libraries listed below
Sorting:
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,098Updated 7 years ago
- wireless hacking - This is automated wireless hacking tool☆1,273Updated 3 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,141Updated 5 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,684Updated 6 years ago
- Network Attack Tool☆1,484Updated 2 years ago
- Inject code and spy on wifi users☆2,610Updated 4 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,770Updated last year
- An offline Wi-Fi Protected Setup brute-force utility☆1,681Updated 2 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆590Updated 3 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Updated 7 years ago
- A framework for wireless pentesting.☆1,219Updated 5 years ago
- Continuously jam all wifi clients/routers☆4,180Updated last year
- Framework for Man-In-The-Middle attacks☆3,630Updated 7 years ago
- Evil Twin Attack Bash script☆569Updated 9 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆1,366Updated 4 years ago
- WarBerryPi - Tactical Exploitation☆2,225Updated 6 years ago
- ☆1,884Updated 2 weeks ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,216Updated 5 years ago
- Efficient and advanced man in the middle framework☆2,144Updated 2 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,396Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆1,342Updated 6 years ago
- ☆562Updated 2 years ago
- The famous WPA precomputed cracker, Migrated from Google.☆1,104Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,320Updated 4 years ago
- Sniffs sensitive data from interface or pcap☆1,790Updated 2 years ago
- ☆3,555Updated 3 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆869Updated 6 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,237Updated 7 years ago
- Hacking tool inside a Raspberry Pi zero☆350Updated 8 years ago
- MouseJack device discovery and research tools☆1,358Updated 7 years ago