atimorin / karmaView external linksLinks
All your layer are belong to us
☆21Jan 29, 2014Updated 12 years ago
Alternatives and similar repositories for karma
Users that are interested in karma are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 10 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- A script for 802.11 mass-deauthentication☆29Jul 2, 2014Updated 11 years ago
- WPA/WPA2 Belkin.XXXX, Belkin_XXXXXX, belkin.xxx and belkin.xxxx router default key generator.☆15May 13, 2015Updated 10 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆18Oct 30, 2014Updated 11 years ago
- Start a rogue access point with no effort, with support for hostapd, airbase, sslstrip, sslsplit, tcpdump builtin☆16Mar 8, 2016Updated 9 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- This script will help help you to get the most of router in morocco by using pixiewps , reaver , aircrack-ng ,wifite☆11Sep 12, 2015Updated 10 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- darm - intelligent network sniffer for the masses darm is an attempt to create a very easy to use app that will sniff and report informa…☆30Jun 14, 2013Updated 12 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- This kernel patch enable all 2GHZ & 5GHZ channels (without restriction) for ath9k & ath5k forced to use buildin world regulatory. Work wi…☆11Feb 8, 2024Updated 2 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Oct 21, 2014Updated 11 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- 802.11 frame injection/reception tool for Linux mac80211 stack☆20Dec 30, 2014Updated 11 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆19Aug 19, 2025Updated 5 months ago
- Packet injection for wifi; simplified.☆38Nov 7, 2022Updated 3 years ago
- ☆49Jul 26, 2014Updated 11 years ago
- A quick and dirty utility to capture and store WiFi probes.☆18Dec 14, 2013Updated 12 years ago
- NSA headline generator☆32Feb 11, 2014Updated 12 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆42Jun 6, 2014Updated 11 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Nov 20, 2021Updated 4 years ago
- Simple Script to query hash databases APIs☆16Oct 27, 2018Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- The 802.11 Hacking Repo.☆41Aug 10, 2015Updated 10 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- Tools for working with the 802.11B scrambler when writing Packet-in-Packet exploits.☆20Sep 15, 2013Updated 12 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- pwnig all the (web)things☆21Nov 21, 2020Updated 5 years ago