A WPA3 dictionary cracker
☆356Jul 10, 2023Updated 2 years ago
Alternatives and similar repositories for wacker
Users that are interested in wacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆125Oct 24, 2025Updated 5 months ago
- A simulated WiFi capture the flag setup☆18Nov 1, 2022Updated 3 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆253Apr 18, 2025Updated 11 months ago
- Evil client portion of EAP relay attack☆219Jul 5, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆85Oct 27, 2023Updated 2 years ago
- mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4☆110Oct 7, 2020Updated 5 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆246Feb 3, 2025Updated last year
- ☆20Aug 11, 2024Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,480Sep 22, 2024Updated last year
- Simple mods to wpa_supplicant to allow more efficient online bruting☆20Aug 23, 2019Updated 6 years ago
- Virtualized Wi-Fi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge …☆378Feb 26, 2026Updated last month
- A command line tool for querying wigle.net and displaying results on Google Maps.☆42Jan 24, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- large hashcat rulesets generated from real-world compromised passwords☆397Nov 26, 2020Updated 5 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- Rizzyscope: Wireless Signal Strength Monitor☆12Aug 30, 2025Updated 7 months ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- SensePost's modified hostapd for wifi attacks.☆607Aug 5, 2024Updated last year
- MacStealer: Wi-Fi Client Isolation Bypass☆543Dec 17, 2025Updated 3 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- A wacky exploitation framework written in pure python3.☆22Mar 24, 2024Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 3 years ago
- Network Analysis Tool☆3,345Apr 10, 2023Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆141Mar 19, 2024Updated 2 years ago
- Unicode encoding attacks with machine learning☆97Nov 25, 2021Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Mar 17, 2026Updated 3 weeks ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago