Modified hostapd to facilitate AP impersonation attacks
☆518Jun 1, 2018Updated 7 years ago
Alternatives and similar repositories for hostapd-wpe
Users that are interested in hostapd-wpe are comparing it to the libraries listed below
Sorting:
- ☆49Jul 26, 2014Updated 11 years ago
- SensePost's modified hostapd for wifi attacks.☆600Aug 5, 2024Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,465Sep 22, 2024Updated last year
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Jun 21, 2021Updated 4 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,097Aug 21, 2018Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- Evil client portion of EAP relay attack☆213Jul 5, 2023Updated 2 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Feb 3, 2025Updated last year
- ☆424Aug 29, 2017Updated 8 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- ☆384Sep 22, 2012Updated 13 years ago
- Hostapd-wpe (Wireless Pwnage Edition) packages for OpenWRT Barrier Breaker 14.07☆19Jul 8, 2015Updated 10 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- Framework for Man-In-The-Middle attacks☆3,635Aug 28, 2018Updated 7 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,818Jan 19, 2020Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,495Feb 27, 2018Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,642Oct 11, 2018Updated 7 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆873Aug 24, 2017Updated 8 years ago
- Sniffs sensitive data from interface or pcap☆1,813Nov 2, 2023Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,900Jan 24, 2024Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,838Jun 15, 2020Updated 5 years ago
- SSH man-in-the-middle tool☆1,733Jul 2, 2021Updated 4 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago
- HTA encryption tool for RedTeams☆1,424Nov 9, 2022Updated 3 years ago
- Rogue AP killer☆92Jan 24, 2018Updated 8 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago