Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.
☆251Apr 18, 2025Updated 10 months ago
Alternatives and similar repositories for wifi-framework
Users that are interested in wifi-framework are comparing it to the libraries listed below
Sorting:
- Common python and scapy scripts for Wi-Fi☆66Dec 22, 2025Updated 2 months ago
- A full-featured open-source Wi-Fi fuzzer☆197Sep 30, 2025Updated 5 months ago
- A WPA3 dictionary cracker☆350Jul 10, 2023Updated 2 years ago
- MacStealer: Wi-Fi Client Isolation Bypass☆533Dec 17, 2025Updated 2 months ago
- Owfuzz: a WiFi protocol fuzzing tool☆248Feb 15, 2023Updated 3 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ☆16Aug 14, 2024Updated last year
- Network Security Sniffer☆840Jan 2, 2026Updated 2 months ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Helping you delete your old accounts☆86Aug 23, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- Wi-Fi Exploitation Framework☆2,766Sep 24, 2025Updated 5 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆114May 19, 2023Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆657Aug 29, 2025Updated 6 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Oct 19, 2022Updated 3 years ago
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Diana Credential Recovery Framework☆66Jan 19, 2026Updated last month
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆21Feb 10, 2026Updated 3 weeks ago
- ☆198Jan 18, 2023Updated 3 years ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆301Mar 1, 2023Updated 3 years ago
- Kerberoast attack -pure python-☆433Nov 30, 2023Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Jul 7, 2023Updated 2 years ago
- ☆198Updated this week
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 3 years ago
- ☆568Mar 28, 2024Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆550Jul 16, 2021Updated 4 years ago