FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.
☆2,267Dec 18, 2021Updated 4 years ago
Alternatives and similar repositories for FruityWifi
Users that are interested in FruityWifi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,158Apr 18, 2020Updated 5 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Aug 21, 2018Updated 7 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,361Aug 12, 2024Updated last year
- 📡 A python program to create a fake AP and sniff data.☆1,692Nov 3, 2019Updated 6 years ago
- The Rogue Access Point Framework☆14,516Feb 4, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- wireless hacking - This is automated wireless hacking tool☆1,281Oct 27, 2022Updated 3 years ago
- Inject code and spy on wifi users☆2,618Jul 31, 2021Updated 4 years ago
- A framework for wireless pentesting.☆1,231Oct 14, 2020Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆3,636Aug 28, 2018Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- WarBerryPi - Tactical Exploitation☆2,224Nov 9, 2019Updated 6 years ago
- Continuously jam all wifi clients/routers☆4,227Jul 20, 2024Updated last year
- Sniffs sensitive data from interface or pcap☆1,822Nov 2, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Sep 1, 2021Updated 4 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Sep 21, 2018Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,449Nov 26, 2018Updated 7 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆257Nov 19, 2017Updated 8 years ago
- Exploitation Framework for Embedded Devices☆13,045Mar 2, 2026Updated 3 weeks ago
- Porting the Pineapple to the Raspberry Pi☆85Jun 27, 2013Updated 12 years ago
- Wireless Auditing, Intrusion Detection & Prevention System☆519Oct 22, 2017Updated 8 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆870Aug 4, 2017Updated 8 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,954Mar 22, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆593Mar 3, 2022Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- Undetectable Windows Payload Generation☆1,610Nov 8, 2022Updated 3 years ago
- SpeedPhishing Framework☆450Aug 8, 2019Updated 6 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,476Sep 22, 2024Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,833Jan 19, 2020Updated 6 years ago
- Network Infrastructure Penetration Testing Tool☆1,669Jun 2, 2021Updated 4 years ago
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆2,518Aug 26, 2020Updated 5 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,498Sep 22, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,242Nov 20, 2025Updated 4 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,831Mar 17, 2026Updated last week
- A swiss army knife for pentesting networks☆9,108Dec 6, 2023Updated 2 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,388Jun 17, 2022Updated 3 years ago
- ☆3,496Dec 25, 2024Updated last year
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,865Jun 28, 2024Updated last year
- Efficient and advanced man in the middle framework☆2,178Mar 23, 2023Updated 3 years ago