All Projects → sundaysec → anubis

sundaysec / anubis

Licence: other
Captive wifi hotspot bypass tool for Linux

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to anubis

Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-26.09%)
Mutual labels:  penetration-testing, kali-linux, hacking-tool, parrotsec
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+7554.35%)
Mutual labels:  penetration-testing, information-security, hacking-tool
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+906.52%)
Mutual labels:  penetration-testing, information-security, kali-linux
Armor
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (+395.65%)
Mutual labels:  penetration-testing, information-security, kali-linux
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+2636.96%)
Mutual labels:  penetration-testing, kali-linux, hacking-tool
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+3865.22%)
Mutual labels:  penetration-testing, kali-linux, hacking-tool
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+82.61%)
Mutual labels:  kali-linux, hacking-tool, parrotsec
OSCP-A-Step-Forward
Opening the door, one reverse shell at a time
Stars: ✭ 126 (+173.91%)
Mutual labels:  penetration-testing, kali-linux
boxer
Boxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-67.39%)
Mutual labels:  penetration-testing, hacking-tool
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+63.04%)
Mutual labels:  penetration-testing, hacking-tool
IP-Tracker
Track any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Stars: ✭ 53 (+15.22%)
Mutual labels:  kali-linux, hacking-tool
CyberPunkNetrunner
Cyberpunk 2077 Netrunner Hacking Tool (Easy to use and install). Don't use it on illegal and malicious activity. Inspired by the game CyberPunk 2077 https://www.cyberpunk.net/
Stars: ✭ 69 (+50%)
Mutual labels:  kali-linux, parrotsec
vimana-framework
Vimana is an experimental security framework that aims to provide resources for auditing Python web applications.
Stars: ✭ 47 (+2.17%)
Mutual labels:  information-security, hacking-tool
Red-Rabbit-V4
The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (+167.39%)
Mutual labels:  penetration-testing, hacking-tool
overload
📡 Overload DoS Tool (Layer 7)
Stars: ✭ 167 (+263.04%)
Mutual labels:  kali-linux, hacking-tool
Brutegram
Instagram multi-bruteforce Platfrom
Stars: ✭ 183 (+297.83%)
Mutual labels:  kali-linux, hacking-tool
ApeX
Using Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (+89.13%)
Mutual labels:  kali-linux, wifi-security
WPCracker
WordPress pentest tool
Stars: ✭ 34 (-26.09%)
Mutual labels:  penetration-testing, hacking-tool
Ashok
Ashok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+136.96%)
Mutual labels:  penetration-testing, hacking-tool
TokenBreaker
JSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (+10.87%)
Mutual labels:  penetration-testing, hacking-tool

Anubis Captive Wifi Hotspot bypass

Captive Portal

A Web page used on public-access networks that require a user to view and interact with before being granted access to the public network. Captive portals are widely used by businesses that offer free Wi-Fi hotspots to Internet users. Usually a captive portal requires users to read and accept the business' acceptable use policy (AUP).

Many institutions use this type of authentication in the WIFI as a 'sure' means of preventing unauthorised access.

Image Example

alt text

Carlos Pérez-Aradros Herce Captive hotspot

How Anubis works

alt text

Captive Wifi Hotspot network structure with the attacker standby The captive hotspot accepts traffic only from the registered devices anubis scans for all the devices connected on the same network It then tries to change the device IDS into the identified deviced IDs

Installing anubis

Clone the anubis project files

git clone --recursive https://github.com/sundaysec/anubis.git

Navigate to the cloned folder

cd ./anubis/

Install dependencies pip install -r requirements.txt

Run the installer pip install -r requirements.txt Run anubis

python anubis.py

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].