Modified hostapd to facilitate AP impersonation attacks
☆518Jun 1, 2018Updated 7 years ago
Alternatives and similar repositories for hostapd-wpe
Users that are interested in hostapd-wpe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆49Jul 26, 2014Updated 11 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Jun 21, 2021Updated 4 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,473Sep 22, 2024Updated last year
- SensePost's modified hostapd for wifi attacks.☆603Aug 5, 2024Updated last year
- Hostapd-wpe (Wireless Pwnage Edition) packages for OpenWRT Barrier Breaker 14.07☆19Jul 8, 2015Updated 10 years ago
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Aug 21, 2018Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆245Feb 3, 2025Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- ☆383Sep 22, 2012Updated 13 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆872Aug 24, 2017Updated 8 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,828Jan 19, 2020Updated 6 years ago
- Framework for Man-In-The-Middle attacks☆3,636Aug 28, 2018Updated 7 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Apr 17, 2016Updated 9 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,846Jun 15, 2020Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.