xtr4nge / FruityWifi
FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra packages. Tested in Debian, Kali Linux, Kali Linux ARM (Raspberry Pi), Raspbian (Raspberry Pi), Pwnpi (Raspberry Pi), Bugtraq, NetHunter.
☆2,215Updated 3 years ago
Alternatives and similar repositories for FruityWifi:
Users that are interested in FruityWifi are comparing it to the libraries listed below
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,116Updated 4 years ago
- wireless hacking - This is automated wireless hacking tool☆1,250Updated 2 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,089Updated 6 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,666Updated 5 years ago
- Inject code and spy on wifi users☆2,595Updated 3 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,142Updated 5 years ago
- Network Attack Tool☆1,464Updated last year
- Continuously jam all wifi clients/routers☆4,075Updated 8 months ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,182Updated 7 years ago
- Sniffs sensitive data from interface or pcap☆1,738Updated last year
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,700Updated 8 months ago
- Framework for Man-In-The-Middle attacks☆3,607Updated 6 years ago
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,154Updated 7 months ago
- A framework for wireless pentesting.☆1,204Updated 4 years ago
- WarBerryPi - Tactical Exploitation☆2,223Updated 5 years ago
- An offline Wi-Fi Protected Setup brute-force utility☆1,601Updated last year
- Evil Twin Attack Bash script☆564Updated 9 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,280Updated 6 months ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆1,322Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,307Updated 3 years ago
- WiFi arsenal☆1,983Updated 4 years ago
- Efficient and advanced man in the middle framework☆2,088Updated 2 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆859Updated 6 years ago
- Some usefull scripts for KaliLinux☆458Updated 2 years ago
- ☆3,368Updated 2 years ago
- wide range mass audit toolkit☆996Updated 6 years ago
- Undetectable Windows Payload Generation☆1,584Updated 2 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,092Updated 4 years ago
- ☆1,775Updated 3 months ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,118Updated this week