A collection of awesome resources related to 802.11 security, tools and other things
☆170Apr 10, 2019Updated 6 years ago
Alternatives and similar repositories for awesome-wifi-security
Users that are interested in awesome-wifi-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small Linux command-line tool to "ping" 802.11 devices☆28Aug 29, 2012Updated 13 years ago
- The 802.11 Hacking Repo.☆42Aug 10, 2015Updated 10 years ago
- Wireless configuration tool☆17Jan 22, 2015Updated 11 years ago
- WiFi arsenal☆2,173Jul 6, 2020Updated 5 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- Tools for working with the 802.11B scrambler when writing Packet-in-Packet exploits.☆20Sep 15, 2013Updated 12 years ago
- This code has base on a code made by Mathy Vanhoef (https://github.com/vanhoefm/krackattacks-poc-zerokey). Please, take a look on README.…☆53Jul 3, 2018Updated 7 years ago
- A script for 802.11 mass-deauthentication☆30Jul 2, 2014Updated 11 years ago
- A list of checks with tips for analyzing the security of Android applications☆14Nov 19, 2019Updated 6 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Sep 11, 2023Updated 2 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automation scripts in preparation for PWK/OSCP labs☆17Sep 20, 2021Updated 4 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Collection of F-Droid repositories☆17Nov 23, 2023Updated 2 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- A full Python implementation of the WPA2 encryption algorithm, using no encryption libraries☆18Nov 18, 2016Updated 9 years ago
- Rogue AP killer☆92Jan 24, 2018Updated 8 years ago
- Tiny lib for parsing radiotap/802.11 headers in python☆11Apr 7, 2018Updated 7 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- ☆25Jul 26, 2017Updated 8 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆32Apr 8, 2019Updated 6 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- ☆19Jul 2, 2024Updated last year
- Central Regulatory Domain Agent☆16Mar 1, 2024Updated 2 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,364Sep 3, 2025Updated 6 months ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng☆14Jan 1, 2019Updated 7 years ago