hexway / r00kie-kr00kie
PoC exploit for the CVE-2019-15126 kr00k vulnerability
☆217Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for r00kie-kr00kie
- Evil client portion of EAP relay attack☆191Updated last year
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆286Updated 3 weeks ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆373Updated 3 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆227Updated 2 months ago
- ☆109Updated 2 years ago
- BadUSB in Routers☆191Updated last year
- Smart Install Exploitation Tool☆572Updated 2 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆176Updated 5 years ago
- ☆61Updated 2 years ago
- ☆121Updated 5 years ago
- SensePost's modified hostapd for wifi attacks.☆549Updated 3 months ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆62Updated 2 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆298Updated 5 months ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆279Updated last year
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆288Updated 5 years ago
- A Linux enumeration script for Hack The Box☆187Updated 4 years ago
- A small project for stealing Wi-Fi passwords via browser's cache poisoning.☆145Updated 2 years ago
- An SNMPv3 User Enumerator and Attack tool☆245Updated 4 years ago
- Linux Privilege Escalation Tool☆180Updated 5 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆280Updated 3 weeks ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆107Updated 5 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆152Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆537Updated 3 years ago
- A simple embedded Linux backdoor.☆194Updated 4 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago