Krack POC
☆126Apr 24, 2018Updated 7 years ago
Alternatives and similar repositories for krack-poc
Users that are interested in krack-poc are comparing it to the libraries listed below
Sorting:
- Proof-of-concept of the KRACK attack against Linux and Android☆158Mar 6, 2018Updated 8 years ago
- Work in progress toolkit for KRACK attack.☆70Mar 26, 2019Updated 6 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- ☆38Oct 17, 2017Updated 8 years ago
- This code has base on a code made by Mathy Vanhoef (https://github.com/vanhoefm/krackattacks-poc-zerokey). Please, take a look on README.…☆53Jul 3, 2018Updated 7 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆79Aug 18, 2018Updated 7 years ago
- ☆11Oct 13, 2019Updated 6 years ago
- ☆76Feb 5, 2019Updated 7 years ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 4 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- ☆3,496Dec 25, 2024Updated last year
- ☆43Nov 8, 2017Updated 8 years ago
- Btlejack Firmware for nRF52-based devices (Micro:Bit v2, etc.)☆20Jun 9, 2022Updated 3 years ago
- ☆65Jan 12, 2022Updated 4 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- ☆139Apr 24, 2019Updated 6 years ago
- OnSense is a hybrid spectrum sensing scanner using a combination of SDR and conventional receivers.☆13Oct 9, 2013Updated 12 years ago
- Game of Thrones hacking CTF (Capture the flag)☆64Mar 7, 2025Updated last year
- ABANDONED: Windows provides no mechanism for injecting packets☆28Oct 21, 2017Updated 8 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆222Mar 22, 2020Updated 5 years ago
- ☆16Aug 14, 2024Updated last year
- ☆13May 20, 2019Updated 6 years ago
- Dodgy reflective DLL injector PoC for 32-bit Windows☆17Aug 20, 2018Updated 7 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆757Mar 23, 2018Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A Phishing WIFI Rogue Captive Portal!☆43Feb 12, 2019Updated 7 years ago
- An all-in-one WPA/WPS toolkit☆429Aug 31, 2023Updated 2 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- ☆136Aug 4, 2022Updated 3 years ago