blunderbuss-wctf / wackerLinks
A WPA3 dictionary cracker
☆335Updated 2 years ago
Alternatives and similar repositories for wacker
Users that are interested in wacker are comparing it to the libraries listed below
Sorting:
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆112Updated 9 months ago
- Zero Infrastructure Password Cracking☆409Updated last year
- Fork from @rsmudge/armitage☆136Updated 2 years ago
- karma WiFi attack implementation☆54Updated 10 months ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆371Updated last year
- A WLAN red team framework.☆157Updated 11 months ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆418Updated last year
- Script for orchestrating mana rogue WiFi Access Points.☆242Updated 7 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A web front-end for password cracking and analytics☆382Updated 4 months ago
- Evil client portion of EAP relay attack☆204Updated 2 years ago
- Automated rogue access point setup tool.☆196Updated 4 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- A hashcat-based distributed password cracking system☆160Updated 2 months ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆117Updated last month
- Hashcat web interface☆316Updated 6 months ago
- ☆125Updated 3 years ago
- SensePost's modified hostapd for wifi attacks.☆581Updated last year
- ☆108Updated last year
- For pentesters who don't wanna leave their terminals.☆184Updated 4 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆396Updated 4 years ago
- Kali noise reduction tool☆318Updated 4 months ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆411Updated 2 years ago
- large hashcat rulesets generated from real-world compromised passwords☆398Updated 4 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆219Updated 2 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆305Updated last year
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆262Updated 2 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆89Updated 3 years ago