EvilTwinFramework
Pentest toolkit
A framework for simulating evil twin Wi-Fi attacks and exploiting vulnerabilities for pentesting purposes.
A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
282 stars
19 watching
56 forks
Language: Python
last commit: about 1 year ago
Linked from 1 awesome list
evil-twinframeworkhackingpentesterssecuritytoolkit
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 |
| | An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access | 189 |
| | A collection of tools and scripts for penetration testing and vulnerability assessment of web applications. | 2 |
| | An automation framework for network and web security testing and exploitation. | 1,033 |
| | A comprehensive collection of tools and techniques for web application security testing and exploitation | 61,904 |
| | A Rust framework providing implants and tools for command-and-control operations in penetration testing | 565 |
| | A local penetration testing lab using Docker Compose to simulate various attack scenarios and systems vulnerabilities. | 182 |
| | A penetration testing tool for IoT devices, allowing users to simulate security attacks on target devices. | 211 |
| | A collection of scripts designed to facilitate penetration testing and threat simulation by providing tools for reconnaissance, environment setup, and network exploitation. | 207 |
| | A tool designed to demonstrate cross-site scripting (XSS) vulnerabilities and exploits using JavaScript and Django. | 2,141 |
| | A pentesting framework with shell integrations designed to automate workflows and streamline productivity. | 3 |
| | A container repository for storing and sharing public web hacking techniques and tools. | 1,953 |
| | A Python-based collection of tools for gathering forensic information from Office documents | 26 |
| | A Python-based framework for conducting man-in-the-middle attacks and rogue access point exploits on wireless networks. | 2,016 |
| | A cheat sheet and resource collection for learning and practicing penetration testing and exploit development | 795 |