EvilTwinFramework
Pentest toolkit
A framework for simulating evil twin Wi-Fi attacks and exploiting vulnerabilities for pentesting purposes.
A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
282 stars
19 watching
56 forks
Language: Python
last commit: 7 months ago
Linked from 1 awesome list
evil-twinframeworkhackingpentesterssecuritytoolkit
Related projects:
Repository | Description | Stars |
---|---|---|
| A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 |
| An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access | 189 |
| A collection of tools and scripts for penetration testing and vulnerability assessment of web applications. | 2 |
| An automation framework for network and web security testing and exploitation. | 1,033 |
| A comprehensive collection of tools and techniques for web application security testing and exploitation | 61,904 |
| A Rust framework providing implants and tools for command-and-control operations in penetration testing | 565 |
| A local penetration testing lab using Docker Compose to simulate various attack scenarios and systems vulnerabilities. | 182 |
| A penetration testing tool for IoT devices, allowing users to simulate security attacks on target devices. | 211 |
| A collection of scripts designed to facilitate penetration testing and threat simulation by providing tools for reconnaissance, environment setup, and network exploitation. | 207 |
| A tool designed to demonstrate cross-site scripting (XSS) vulnerabilities and exploits using JavaScript and Django. | 2,141 |
| A pentesting framework with shell integrations designed to automate workflows and streamline productivity. | 3 |
| A container repository for storing and sharing public web hacking techniques and tools. | 1,953 |
| A Python-based collection of tools for gathering forensic information from Office documents | 26 |
| A Python-based framework for conducting man-in-the-middle attacks and rogue access point exploits on wireless networks. | 2,016 |
| A cheat sheet and resource collection for learning and practicing penetration testing and exploit development | 795 |