Repository navigation
rogue-ap
- Website
- Wikipedia
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Automated rogue access point setup tool.
Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC
Rogue Captive Portal using a Raspberry Pi
Detect and alert when Rogue AP and Deauth attacks occur
WiFi Evil Twin Attack - Credential Harvest Tool
HostAPd Rogue AP with MAC change on both adapters and SSLStrip traffic capture.
This is a python program to use wifipumpkin3 for everyone as its simple to use
📍 Check if a Wi-Fi network is located in a reasonable geographic location
Man In The Middle Attack Framework
Docker container for bettercap - https://github.com/bettercap/bettercap
Rogue access point com captive portal para ESP32 para Coleta de Credenciais
Raise it. Level it. Defend with it. A cyber-pet that unlocks real Wi-Fi scans.
Web-driven WiFi AP for cybersecurity red-teaming
Multi-layer real-time MITM protection for Linux — blocks ARP poisoning, DNS spoofing, rogue DHCP offers, rogue access points, SSL strip, broadcast poisoning (LLMNR, mDNS, NBNS, WS-Discovery), ICMP redirect exploits, HTTPS to HTTP downgrade attacks