chinatso / KRACK
☆38Updated 7 years ago
Alternatives and similar repositories for KRACK
Users that are interested in KRACK are comparing it to the libraries listed below
Sorting:
- Work in progress toolkit for KRACK attack.☆69Updated 6 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆53Updated 9 years ago
- Krack POC☆124Updated 7 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆85Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- ☆53Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆46Updated 8 years ago
- Remote Code Execution exploit on TVT DVR☆61Updated 4 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Debian live build for the Pocket-Kali☆41Updated 7 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 7 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 8 years ago
- ☆76Updated 6 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆124Updated 10 years ago
- Metasploit Framework with Viproy installed.☆37Updated 8 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆73Updated 4 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …