The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
-
Updated
Aug 18, 2025 - Go
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Automated rogue access point setup tool.
Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC
Rogue Captive Portal using a Raspberry Pi
Rogue AP using a Raspberry Pi Zero W
Detect and alert when Rogue AP and Deauth attacks occur
WiFi Evil Twin Attack - Credential Harvest Tool
HostAPd Rogue AP with MAC change on both adapters and SSLStrip traffic capture.
This is a python program to use wifipumpkin3 for everyone as its simple to use
📍 Check if a Wi-Fi network is located in a reasonable geographic location
Man In The Middle Attack Framework
Rogue access point com captive portal para ESP32 para Coleta de Credenciais
Docker container for bettercap - https://github.com/bettercap/bettercap
Raise it. Level it. Defend with it. A cyber-pet that unlocks real Wi-Fi scans.
Multi-layer real-time MITM protection for Linux — blocks ARP poisoning, DNS spoofing, rogue DHCP offers, rogue access points, SSL strip, broadcast poisoning (LLMNR, mDNS, NBNS, WS-Discovery), ICMP redirect exploits, HTTPS to HTTP downgrade attacks
Add a description, image, and links to the rogue-ap topic page so that developers can more easily learn about it.
To associate your repository with the rogue-ap topic, visit your repo's landing page and select "manage topics."