akabe1 / kr00ker
An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)
☆62Updated 3 years ago
Alternatives and similar repositories for kr00ker
Users that are interested in kr00ker are comparing it to the libraries listed below
Sorting:
- Simple Karma Attack☆69Updated 4 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆50Updated 7 years ago
- ☆62Updated 3 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 6 months ago
- Automate Metasploit scanning and exploitation☆115Updated 7 months ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- LOCAL ROOT EXPLOITS☆37Updated 6 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4☆113Updated 4 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- P4wnP1 - WiFi covert channel - Client agent (experimental Proof of Concept) by MaMe82☆84Updated 7 years ago
- a hash query tool☆37Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Docker images for learning wifi hacking☆66Updated 6 years ago
- ☆73Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ☆67Updated 7 months ago
- Using IPv6 to Bypass Security☆93Updated last year
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- Shodanwave - Netwave IP Camera☆18Updated 7 years ago
- A tool that automates MAC address and hostname spoofing☆62Updated 5 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago