mdk4 deauther bash script with channel hunting
☆18Feb 9, 2026Updated last month
Alternatives and similar repositories for mkd4_helper
Users that are interested in mkd4_helper are comparing it to the libraries listed below
Sorting:
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- Botnet malware designed to infect and control a set of raspberry PIs. For educational purposes only.☆14May 23, 2018Updated 7 years ago
- Most updated UI for google phishing by D4RKH0R1Z0N☆26Mar 17, 2024Updated 2 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- simple terminal ascii tables for nim☆24May 29, 2019Updated 6 years ago
- Code and data for the CCS'19 paper "Watching You Watch: The Tracking Ecosystem of Over-the-TopTV Streaming Devices"☆13Dec 14, 2019Updated 6 years ago
- Chan-vy é um script que baixa o código-fonte de todas as ferramentas disponíveis no Kali Linux, direto dos seus repositórios oficiais e d…☆12Feb 5, 2024Updated 2 years ago
- A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels an…☆11Dec 9, 2025Updated 3 months ago
- Uses CC1101's to create a replay attack against rolling codes☆11Jun 19, 2018Updated 7 years ago
- 🔍 Improve your files enumeration with specific extensions!☆17Jan 11, 2022Updated 4 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- Pw0 Framewrok - magical android pentest app 🔮! Pixie Dust, Handshakes, Deauth, Nmap, Port scanner and more!☆18Aug 8, 2021Updated 4 years ago
- An RF stack for building exfiltration systems.☆18Oct 24, 2018Updated 7 years ago
- ☆16Aug 14, 2024Updated last year
- General questions about deobfuscating JavaScript☆16Aug 25, 2020Updated 5 years ago
- Using a MITM proxy to add a browser-based keylogger to devices on your local network☆14Jul 10, 2020Updated 5 years ago
- Repository for the defense mechanism of the paper "The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions"☆10Feb 10, 2022Updated 4 years ago
- The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks☆37Feb 20, 2024Updated 2 years ago
- Snoopy v2.0.1 - Automated digital terrestrial tracking framework☆11Feb 10, 2017Updated 9 years ago
- Anti-stylometry tool based on PSAL's Anonymouth☆11Oct 30, 2019Updated 6 years ago
- Frida gadget for dumping traffic between an apk and usb device☆26Feb 20, 2026Updated last month
- ☆15Feb 10, 2026Updated last month
- Whatever Social's website, found at whatever.social☆18Jul 23, 2024Updated last year
- Collection of my nmap scripts (most are in official nmap release by now)☆35Oct 23, 2013Updated 12 years ago
- Remote control your philips TV using a web application☆21Jan 3, 2012Updated 14 years ago
- •Connect to a VPN in a country of your choice•☆25Sep 24, 2019Updated 6 years ago
- My own custom firmware for the HackRF SDR + PortaPack H1 addon - Not for the faint-hearted.☆21Jun 8, 2020Updated 5 years ago
- This software allows you to easily perform a variety of actions to test 802.11 wireless networks by using an inexpensive ESP8266 WiFi SoC…☆12May 13, 2018Updated 7 years ago
- Recover your Mozilla passwords with a simple c script☆23Feb 1, 2015Updated 11 years ago
- Implements just Wi-Fi connection with NVS stored credentials. If connection fails then Wi-Fi provisioning with AP and captive portal page…☆17Mar 12, 2025Updated last year
- Topguw implements Gr-gsm tools in Java and makes possible to uses to gsm data☆15Mar 31, 2018Updated 7 years ago
- Use publicly available data to track NFL betting trends.☆17Jan 27, 2025Updated last year
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- [Patched] CloudFlare Bypass/Resolver in Python [Patched]☆16Nov 11, 2022Updated 3 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆41Mar 26, 2022Updated 3 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- 🔌WebRTC message broker☆30Nov 29, 2019Updated 6 years ago