Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.
☆252Apr 18, 2025Updated 11 months ago
Alternatives and similar repositories for wifi-framework
Users that are interested in wifi-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wi-Fi MFP Deauthentication: proof-of-concepts, security patches, and more.☆32Apr 15, 2023Updated 2 years ago
- Common python and scapy scripts for Wi-Fi☆66Dec 22, 2025Updated 3 months ago
- A full-featured open-source Wi-Fi fuzzer☆198Sep 30, 2025Updated 5 months ago
- A WPA3 dictionary cracker☆350Jul 10, 2023Updated 2 years ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Jun 23, 2023Updated 2 years ago
- Owfuzz: a WiFi protocol fuzzing tool☆249Feb 15, 2023Updated 3 years ago
- ☆16Aug 14, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- MacStealer: Wi-Fi Client Isolation Bypass☆541Dec 17, 2025Updated 3 months ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Oct 19, 2022Updated 3 years ago
- ☆26Aug 20, 2021Updated 4 years ago
- Code for the AsiaCCS 2017 paper "Discovering Logical Vulnerabilities in the Wi-Fi Handshake using Model-Based Testing".☆13Oct 12, 2018Updated 7 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Network Security Sniffer☆843Jan 2, 2026Updated 2 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,374Oct 27, 2023Updated 2 years ago
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- Wi-Fi Exploitation Framework☆2,772Sep 24, 2025Updated 6 months ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Hikvision log4j PoC☆65Dec 29, 2022Updated 3 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆384Nov 2, 2023Updated 2 years ago
- BlueFuzz is a Bluetooth fuzz tester. The scanner is general purpose, while the pseudo-random data generator is customized for OBDII - Blu…☆64Mar 18, 2017Updated 9 years ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆671Mar 5, 2026Updated 2 weeks ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆397Aug 2, 2023Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆677Oct 23, 2025Updated 5 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- ☆200Feb 27, 2026Updated 3 weeks ago
- HUB repository for all the Catsniffer Tools available maintaned by Electronic Cats☆39Mar 13, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Fork of Synacktiv's private Lumina server☆21Feb 22, 2022Updated 4 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago