zackiles / Rspoof
Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.
☆35Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for Rspoof
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 9 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Password scrambler - small util to make your easy passwords complicated!☆14Updated 7 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Updated 3 years ago
- Attacking WPA/WPA encrypted access point without client.☆48Updated 10 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Vulnerability Scanner☆12Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- A script for 802.11 mass-deauthentication☆24Updated 10 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Meteor package for client + server side IMSI-catcher detection.☆19Updated 8 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆19Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 11 years ago
- flood area with fake essids☆20Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- MS17-010☆12Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Wireless discovery and exploitation framework written in Python☆18Updated 13 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Wi-Fi Backdoors☆37Updated 9 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Security Advisories and Researches☆15Updated 10 years ago