chinatso / KRACK
☆38Updated 7 years ago
Alternatives and similar repositories for KRACK:
Users that are interested in KRACK are comparing it to the libraries listed below
- ☆53Updated 7 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- WPS scan and pwn tool☆67Updated 5 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated 2 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆57Updated 6 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Krack POC☆124Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Remote Code Execution exploit on TVT DVR☆61Updated 4 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- miscellaneous handy pentesting tools☆63Updated 4 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Work in progress toolkit for KRACK attack.☆69Updated 6 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆86Updated 9 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆53Updated 9 years ago
- ☆44Updated 5 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Wi-Fi Backdoors☆38Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 6 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago