akabe1 / kr00ker
An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)
☆62Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for kr00ker
- Simple Karma Attack☆66Updated 4 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- A tool that automates MAC address and hostname spoofing☆54Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- Tool to find SMTP servers vulnerable to open relay☆79Updated 4 years ago
- Create a screenshot of a remote desktop because NLA is disabled.☆37Updated 3 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆83Updated 3 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Automated 802.1x Bypass☆84Updated 4 years ago
- Automate Metasploit scanning and exploitation☆112Updated last month
- ☆61Updated 2 years ago
- P4wnP1 - WiFi covert channel - Client agent (experimental Proof of Concept) by MaMe82☆81Updated 6 years ago
- Airodump-ng WiFi Scan Visualizer☆56Updated 6 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆197Updated 5 years ago
- The router hacking repo.☆32Updated 9 years ago
- Docker images for learning wifi hacking☆61Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆14Updated 5 years ago
- Evil client portion of EAP relay attack☆191Updated last year
- Standalone POCs/Exploits from various sources for Jok3r☆26Updated 3 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆12Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆116Updated 5 months ago