Modified hostapd to facilitate AP impersonation attacks
☆517Jun 1, 2018Updated 7 years ago
Alternatives and similar repositories for hostapd-wpe
Users that are interested in hostapd-wpe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆49Jul 26, 2014Updated 11 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Jun 21, 2021Updated 4 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,481Sep 22, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SensePost's modified hostapd for wifi attacks.☆607Aug 5, 2024Updated last year
- Hostapd-wpe (Wireless Pwnage Edition) packages for OpenWRT Barrier Breaker 14.07☆19Jul 8, 2015Updated 10 years ago
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,097Aug 21, 2018Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Feb 4, 2019Updated 7 years ago
- Evil client portion of EAP relay attack☆217Jul 5, 2023Updated 2 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆245Feb 3, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- (extensible) Data Exfiltration Toolkit (DET)☆823Nov 3, 2017Updated 8 years ago
- ☆383Sep 22, 2012Updated 13 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆104Sep 24, 2014Updated 11 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,021Sep 11, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆871Aug 24, 2017Updated 8 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Empire is a PowerShell and Python post-exploitation agent.☆7,831Jan 19, 2020Updated 6 years ago
- Framework for Man-In-The-Middle attacks☆3,639Aug 28, 2018Updated 7 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Apr 17, 2016Updated 10 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆162Aug 5, 2016Updated 9 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,859Jun 15, 2020Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,266Dec 18, 2021Updated 4 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,656Oct 11, 2018Updated 7 years ago
- ☆285Sep 19, 2014Updated 11 years ago
- A swiss army knife for pentesting networks☆9,129Dec 6, 2023Updated 2 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,453Nov 20, 2025Updated 5 months ago
- Pipal, THE password analyser☆661Aug 27, 2023Updated 2 years ago