chinatso / KRACK
☆38Updated 7 years ago
Alternatives and similar repositories for KRACK:
Users that are interested in KRACK are comparing it to the libraries listed below
- ☆53Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆45Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- Wi-Fi Backdoors☆38Updated 9 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆85Updated 6 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Basic examples for MITMf☆16Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 5 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- ABANDONED: Windows provides no mechanism for injecting packets☆28Updated 7 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆67Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆112Updated 8 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 5 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago