A collection of awesome resources related to 802.11 security, tools and other things
☆171Apr 10, 2019Updated 7 years ago
Alternatives and similar repositories for awesome-wifi-security
Users that are interested in awesome-wifi-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small Linux command-line tool to "ping" 802.11 devices☆28Aug 29, 2012Updated 13 years ago
- The 802.11 Hacking Repo.☆42Aug 10, 2015Updated 10 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- Wireless configuration tool☆17Jan 22, 2015Updated 11 years ago
- WiFi arsenal☆2,189Jul 6, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- Tools for working with the 802.11B scrambler when writing Packet-in-Packet exploits.☆20Sep 15, 2013Updated 12 years ago
- A script for 802.11 mass-deauthentication☆30Jul 2, 2014Updated 11 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Sep 11, 2023Updated 2 years ago
- A fire-and-forget program to stop Android apps from running in the background.☆94Updated this week
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automation scripts in preparation for PWK/OSCP labs☆17Sep 20, 2021Updated 4 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Collection of F-Droid repositories☆18Nov 23, 2023Updated 2 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- A full Python implementation of the WPA2 encryption algorithm, using no encryption libraries☆18Nov 18, 2016Updated 9 years ago
- Rogue AP killer☆92Jan 24, 2018Updated 8 years ago
- Tiny lib for parsing radiotap/802.11 headers in python☆11Apr 7, 2018Updated 8 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- ☆25Jul 26, 2017Updated 8 years ago
- Various exploits☆10Apr 27, 2017Updated 9 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,481Sep 22, 2024Updated last year
- A modified frequency regulatory domain configuration that doesn't limit you.☆184Jan 10, 2017Updated 9 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆30Jul 17, 2018Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- ☆20Jul 2, 2024Updated last year
- ☆12Feb 3, 2025Updated last year
- Central Regulatory Domain Agent☆16Mar 1, 2024Updated 2 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,378Sep 3, 2025Updated 8 months ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago