The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
-
Updated
Nov 23, 2024 - JavaScript
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Rogue access point com captive portal para ESP32 para Coleta de Credenciais
WiFi Evil Twin Attack - Credential Harvest Tool
This is a python program to use wifipumpkin3 for everyone as its simple to use
Man In The Middle Attack Framework
Docker container for bettercap - https://github.com/bettercap/bettercap
Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC
HostAPd Rogue AP with MAC change on both adapters and SSLStrip traffic capture.
Rogue Captive Portal using a Raspberry Pi
Rogue AP using a Raspberry Pi Zero W
Automated rogue access point setup tool.
Detect and alert when Rogue AP and Deauth attacks occur
📍 Check if a Wi-Fi network is located in a reasonable geographic location
Add a description, image, and links to the rogue-ap topic page so that developers can more easily learn about it.
To associate your repository with the rogue-ap topic, visit your repo's landing page and select "manage topics."