OpenSecurityResearch / hostapd-wpeLinks
Modified hostapd to facilitate AP impersonation attacks
☆518Updated 7 years ago
Alternatives and similar repositories for hostapd-wpe
Users that are interested in hostapd-wpe are comparing it to the libraries listed below
Sorting:
- SensePost's modified hostapd for wifi attacks.☆599Updated last year
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Updated 7 years ago
- SSLStrip version to defeat HSTS☆323Updated 8 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Updated last year
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆361Updated 5 months ago
- NTP Main-in-the-Middle tool☆250Updated 3 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆870Updated 8 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Updated last year
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆592Updated 3 years ago
- Automated Linux evil maid attack☆435Updated 10 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆183Updated 7 years ago
- caplets and proxy modules.☆513Updated 10 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- ☆242Updated last year
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆273Updated 11 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆257Updated 8 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆561Updated 9 years ago
- Scans for accessibility tools backdoors via RDP☆341Updated 7 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Updated 8 years ago
- application server attack toolkit☆688Updated 5 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆479Updated 6 years ago
- intercepting kali router☆443Updated 8 years ago
- A web front-end for password cracking and analytics☆621Updated 4 years ago
- ☆285Updated 11 years ago
- Offensive DNS server☆323Updated 4 years ago
- Plugins for Metasploit Framework☆478Updated 7 years ago
- ☆251Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆495Updated 4 years ago
- Smart Install Exploitation Tool☆594Updated 4 years ago
- A Software Defined Radio Attack Tool☆545Updated last year