Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.
☆252Apr 18, 2025Updated last year
Alternatives and similar repositories for wifi-framework
Users that are interested in wifi-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wi-Fi MFP Deauthentication: proof-of-concepts, security patches, and more.☆32Apr 15, 2023Updated 3 years ago
- Common python and scapy scripts for Wi-Fi☆65Dec 22, 2025Updated 4 months ago
- A full-featured open-source Wi-Fi fuzzer☆201Sep 30, 2025Updated 7 months ago
- A WPA3 dictionary cracker☆356Jul 10, 2023Updated 2 years ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Jun 23, 2023Updated 2 years ago
- Owfuzz: a WiFi protocol fuzzing tool☆249Feb 15, 2023Updated 3 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- MacStealer: Wi-Fi Client Isolation Bypass☆544Dec 17, 2025Updated 4 months ago
- ☆18Aug 14, 2024Updated last year
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Oct 19, 2022Updated 3 years ago
- Code for the AsiaCCS 2017 paper "Discovering Logical Vulnerabilities in the Wi-Fi Handshake using Model-Based Testing".☆13Oct 12, 2018Updated 7 years ago
- ☆28Aug 20, 2021Updated 4 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Network Security Sniffer☆854Jan 2, 2026Updated 4 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,384Oct 27, 2023Updated 2 years ago
- Evil client portion of EAP relay attack☆217Jul 5, 2023Updated 2 years ago
- Wi-Fi Exploitation Framework☆2,776Sep 24, 2025Updated 7 months ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆277May 10, 2024Updated last year
- Kali Packerge Manager☆64Nov 1, 2023Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hikvision log4j PoC☆65Dec 29, 2022Updated 3 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆385Nov 2, 2023Updated 2 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆65Mar 18, 2017Updated 9 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆688Mar 5, 2026Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆689Oct 23, 2025Updated 6 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- ☆202Feb 27, 2026Updated 2 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Fork of Synacktiv's private Lumina server☆21Feb 22, 2022Updated 4 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Mar 9, 2021Updated 5 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆114May 19, 2023Updated 2 years ago