Script for generating hostapd-wpe configuration files and spoofed certificates
☆46Feb 8, 2017Updated 9 years ago
Alternatives and similar repositories for apd_launchpad
Users that are interested in apd_launchpad are comparing it to the libraries listed below
Sorting:
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Sysmon Config Pusher - Modernized☆33Jan 7, 2026Updated last month
- ☆76May 23, 2024Updated last year
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- meow☆12Dec 6, 2015Updated 10 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- ☆120Mar 28, 2025Updated 11 months ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago
- A simple Python SSH server that reveals passwords of connecting clients☆32Jul 7, 2017Updated 8 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- Scripts to help with specific fuzz testing scenarios. Free, but no support provided.☆14Nov 8, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- Modified hostapd to facilitate AP impersonation attacks☆518Jun 1, 2018Updated 7 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- ☆59May 1, 2019Updated 6 years ago
- A repository with toy implementations of MSCHAPv2, MPEE and WPA/2 to understand EAP better☆38Apr 18, 2019Updated 6 years ago
- ☆49Jul 26, 2014Updated 11 years ago
- Evil client portion of EAP relay attack☆213Jul 5, 2023Updated 2 years ago
- NSA headline generator☆32Feb 11, 2014Updated 12 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 8 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- The 802.11 Hacking Repo.☆41Aug 10, 2015Updated 10 years ago
- Ucki's Recon & Enumeration Pack☆39May 9, 2016Updated 9 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago