PoC exploit for the CVE-2019-15126 kr00k vulnerability
☆223Mar 22, 2020Updated 6 years ago
Alternatives and similar repositories for r00kie-kr00kie
Users that are interested in r00kie-kr00kie are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC of CVE-2019-15126 kr00k vulnerability☆12Mar 19, 2020Updated 6 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆65Jan 19, 2022Updated 4 years ago
- Automated 802.1x Bypass☆88Mar 11, 2020Updated 6 years ago
- Python tool to find specific files in exposed AWS S3 servers.☆21Sep 20, 2020Updated 5 years ago
- Reverse engineered source code of Packet11 driver (802.11 Packet Injection for Windows).☆12May 15, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Routopsy - Hacking Routers with Routers☆179Jul 30, 2021Updated 4 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆605Mar 2, 2021Updated 5 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆246Aug 14, 2024Updated last year
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Nov 19, 2023Updated 2 years ago
- A python tool which runs to display random publicly disclosed Hackerone reports when bored. Automatically opens the report in browser.(Ad…☆42Dec 8, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- gather gather gather☆584Mar 15, 2025Updated last year
- PoC for triggering buffer overflow via CVE-2020-0796☆331Feb 26, 2023Updated 3 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆333May 3, 2020Updated 5 years ago
- ☆17Sep 27, 2022Updated 3 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,478Sep 22, 2024Updated last year
- Network Analysis Tool☆3,345Apr 10, 2023Updated 2 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,351Dec 7, 2020Updated 5 years ago
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 6 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆92May 10, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- Krack POC☆126Apr 24, 2018Updated 7 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Zero Infrastructure Password Cracking☆417Aug 22, 2024Updated last year
- A full Python implementation of the WPA2 encryption algorithm, using no encryption libraries☆18Nov 18, 2016Updated 9 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Aug 6, 2020Updated 5 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Script for orchestrating mana rogue WiFi Access Points.☆246Feb 3, 2025Updated last year
- Evil client portion of EAP relay attack☆219Jul 5, 2023Updated 2 years ago
- ☆1,289Apr 29, 2025Updated 11 months ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆1,076Jan 15, 2021Updated 5 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago