Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.
☆253Apr 18, 2025Updated 11 months ago
Alternatives and similar repositories for wifi-framework
Users that are interested in wifi-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wi-Fi MFP Deauthentication: proof-of-concepts, security patches, and more.☆33Apr 15, 2023Updated 2 years ago
- Common python and scapy scripts for Wi-Fi☆66Dec 22, 2025Updated 3 months ago
- A full-featured open-source Wi-Fi fuzzer☆200Sep 30, 2025Updated 6 months ago
- A WPA3 dictionary cracker☆356Jul 10, 2023Updated 2 years ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Jun 23, 2023Updated 2 years ago
- Owfuzz: a WiFi protocol fuzzing tool☆248Feb 15, 2023Updated 3 years ago
- ☆17Aug 14, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- MacStealer: Wi-Fi Client Isolation Bypass☆543Dec 17, 2025Updated 3 months ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Oct 19, 2022Updated 3 years ago
- ☆28Aug 20, 2021Updated 4 years ago
- Code for the AsiaCCS 2017 paper "Discovering Logical Vulnerabilities in the Wi-Fi Handshake using Model-Based Testing".☆13Oct 12, 2018Updated 7 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Network Security Sniffer☆851Jan 2, 2026Updated 3 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago
- Evil client portion of EAP relay attack☆219Jul 5, 2023Updated 2 years ago
- Wi-Fi Exploitation Framework☆2,773Sep 24, 2025Updated 6 months ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆277May 10, 2024Updated last year
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hikvision log4j PoC☆65Dec 29, 2022Updated 3 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆385Nov 2, 2023Updated 2 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆65Mar 18, 2017Updated 9 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆680Mar 5, 2026Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆685Oct 23, 2025Updated 5 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- ☆202Feb 27, 2026Updated last month
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Fork of Synacktiv's private Lumina server☆21Feb 22, 2022Updated 4 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆115May 19, 2023Updated 2 years ago