Hackndo / krack-pocLinks
Krack POC
☆126Updated 7 years ago
Alternatives and similar repositories for krack-poc
Users that are interested in krack-poc are comparing it to the libraries listed below
Sorting:
- Proof-of-concept of the KRACK attack against Linux and Android☆157Updated 7 years ago
- ☆63Updated 4 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆160Updated 8 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆100Updated 9 years ago
- new WPS attack tool☆60Updated 10 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 7 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆178Updated 9 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Updated 9 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆117Updated 7 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆93Updated 9 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆94Updated 6 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 6 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Updated last year
- The router hacking repo.☆34Updated 10 years ago
- This code has base on a code made by Mathy Vanhoef (https://github.com/vanhoefm/krackattacks-poc-zerokey). Please, take a look on README.…☆52Updated 7 years ago
- Car Backdoor Maker☆220Updated 7 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆108Updated 2 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 9 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆221Updated 5 years ago
- A smart jamming proof of concept for mobile equipments that could be powered with Modmobmap tool☆100Updated 5 years ago
- BadUSB in Routers☆198Updated 3 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- ☆44Updated 6 years ago
- The Nmap Scanner for Telco☆167Updated 7 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆77Updated 8 years ago
- ☆58Updated 5 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆86Updated 8 years ago