PoC exploit for the CVE-2019-15126 kr00k vulnerability
☆222Mar 22, 2020Updated 5 years ago
Alternatives and similar repositories for r00kie-kr00kie
Users that are interested in r00kie-kr00kie are comparing it to the libraries listed below
Sorting:
- PoC of CVE-2019-15126 kr00k vulnerability☆12Mar 19, 2020Updated 6 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆65Jan 19, 2022Updated 4 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 6 years ago
- Python tool to find specific files in exposed AWS S3 servers.☆21Sep 20, 2020Updated 5 years ago
- Reverse engineered source code of Packet11 driver (802.11 Packet Injection for Windows).☆12May 15, 2020Updated 5 years ago
- Routopsy - Hacking Routers with Routers☆178Jul 30, 2021Updated 4 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆604Mar 2, 2021Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆246Aug 14, 2024Updated last year
- A python tool which runs to display random publicly disclosed Hackerone reports when bored. Automatically opens the report in browser.(Ad…☆42Dec 8, 2022Updated 3 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Nov 19, 2023Updated 2 years ago
- gather gather gather☆583Mar 15, 2025Updated last year
- PoC for triggering buffer overflow via CVE-2020-0796☆329Feb 26, 2023Updated 3 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- ☆17Sep 27, 2022Updated 3 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,470Sep 22, 2024Updated last year
- Network Analysis Tool☆3,338Apr 10, 2023Updated 2 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,349Dec 7, 2020Updated 5 years ago
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- Krack POC☆126Apr 24, 2018Updated 7 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- This shows the hardware and software that is used on my 'Car in a box' to make it think it is a fully working vehicle.☆22May 26, 2023Updated 2 years ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- A full Python implementation of the WPA2 encryption algorithm, using no encryption libraries☆18Nov 18, 2016Updated 9 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 5 months ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Aug 6, 2020Updated 5 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆245Feb 3, 2025Updated last year
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- ☆1,289Apr 29, 2025Updated 10 months ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,076Jan 15, 2021Updated 5 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago