blunderbuss-wctf / wacker
A WPA3 dictionary cracker
☆315Updated last year
Alternatives and similar repositories for wacker:
Users that are interested in wacker are comparing it to the libraries listed below
- Zero Infrastructure Password Cracking☆399Updated 6 months ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆362Updated last year
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆377Updated last year
- SensePost's modified hostapd for wifi attacks.☆560Updated 6 months ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- A repo containing different tools compiled specifically for the Hak5 WiFi Pineapple MK6 and MK7.☆250Updated 11 months ago
- Evil client portion of EAP relay attack☆196Updated last year
- Script for orchestrating mana rogue WiFi Access Points.☆237Updated 2 weeks ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆230Updated last year
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆288Updated 3 months ago
- A WLAN red team framework.☆149Updated 4 months ago
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆324Updated 4 years ago
- Bluetooth Honeypot☆248Updated 4 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆110Updated last month
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆93Updated 2 months ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆203Updated 7 months ago
- GsmEvil 2☆322Updated 2 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆107Updated last year
- A web front-end for password cracking and analytics☆365Updated this week
- ☆114Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆55Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆193Updated 3 years ago
- Fork from @rsmudge/armitage☆128Updated 2 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆290Updated 3 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆283Updated 4 years ago
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆257Updated last year
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆248Updated last year
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆62Updated 3 years ago
- large hashcat rulesets generated from real-world compromised passwords☆394Updated 4 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago