This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing the passphrase of the actual AP.
☆593Mar 3, 2022Updated 4 years ago
Alternatives and similar repositories for WPA2-HalfHandshake-Crack
Users that are interested in WPA2-HalfHandshake-Crack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Aug 21, 2018Updated 7 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 5 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,267Dec 18, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Apr 17, 2016Updated 9 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Nov 11, 2019Updated 6 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Sniffs sensitive data from interface or pcap☆1,826Nov 2, 2023Updated 2 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆102Jan 31, 2017Updated 9 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- peinjector - MITM PE file infector☆611May 11, 2016Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- An offline Wi-Fi Protected Setup brute-force utility☆1,699Apr 19, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,158Apr 18, 2020Updated 5 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,692Nov 3, 2019Updated 6 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 11 years ago
- A demo of altering an opened tab after a timer☆124Jun 11, 2016Updated 9 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Feb 4, 2019Updated 7 years ago
- Wireless Auditing, Intrusion Detection & Prevention System☆519Oct 22, 2017Updated 8 years ago
- Inject code and spy on wifi users☆2,618Jul 31, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Jul 5, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- MassBleed SSL Vulnerability Scanner☆247Apr 18, 2020Updated 5 years ago
- A python script for obfuscating wireless networks☆79Nov 14, 2016Updated 9 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago