Wireless discovery and exploitation framework written in Python
☆18Dec 17, 2010Updated 15 years ago
Alternatives and similar repositories for airxploit
Users that are interested in airxploit are comparing it to the libraries listed below
Sorting:
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 3 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 10 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- 802.11 Exploitation Tool for use with Kali 2. More tools available than WHAT or WHAT Pi☆16Apr 3, 2016Updated 9 years ago
- This script will help help you to get the most of router in morocco by using pixiewps , reaver , aircrack-ng ,wifite☆11Sep 12, 2015Updated 10 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- WPA/WPA2 Belkin.XXXX, Belkin_XXXXXX, belkin.xxx and belkin.xxxx router default key generator.☆15May 13, 2015Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Basic script to rotate through reverse SSH proxies built through EC2, useful for obfuscating (weakly anonymizing) your source. Nice for b…☆13Mar 6, 2015Updated 10 years ago
- 802.11 frame injection/reception tool for Linux mac80211 stack☆20Dec 30, 2014Updated 11 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- Small util to dump the IDT table of a running OS X system with kmem enabled☆21May 5, 2014Updated 11 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- This project has been done as the Final Year Project for Bsc Degree in Computer Networking and IT Security. It's main objective is to mon…☆17Jul 31, 2014Updated 11 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Mar 24, 2014Updated 11 years ago
- A quick and dirty utility to capture and store WiFi probes.☆18Dec 14, 2013Updated 12 years ago
- Logging clients with airodump-ng☆15Dec 13, 2013Updated 12 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆18Oct 30, 2014Updated 11 years ago
- Start a rogue access point with no effort, with support for hostapd, airbase, sslstrip, sslsplit, tcpdump builtin☆16Mar 8, 2016Updated 9 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆42Jun 6, 2014Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- SSTP VPN client for Linux☆19Feb 1, 2021Updated 5 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- Wifi sniffing and hijacking tool☆81Sep 25, 2014Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago