jabbaw0nky / DragonShiftView external linksLinks
A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability
☆56Aug 25, 2024Updated last year
Alternatives and similar repositories for DragonShift
Users that are interested in DragonShift are comparing it to the libraries listed below
Sorting:
- Dragon Drain attack packaged as airgeddon plugin☆29Jan 30, 2026Updated 2 weeks ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- ☆135Apr 24, 2019Updated 6 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆31May 11, 2024Updated last year
- Find Inbound Email Domains☆35Dec 21, 2023Updated 2 years ago
- ESPHome component for reading/writing information to Broan ERVs via serial☆24Jan 8, 2026Updated last month
- From C to binary shellcode converter.☆52Nov 11, 2025Updated 3 months ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆11Nov 24, 2025Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post☆236Nov 7, 2024Updated last year
- Sends random sms text messages to a phone number via email. You can chose the amount of texts and time between the text messages.☆40Oct 26, 2023Updated 2 years ago
- Plugins for airgeddon☆47Nov 4, 2025Updated 3 months ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆32Mar 15, 2022Updated 3 years ago
- Stupid simple XOR encryption utility☆34Oct 3, 2025Updated 4 months ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- Living off the land searches for explorer and sharepoint☆92Dec 7, 2025Updated 2 months ago
- This repository is for code and documentation for Badge Engine, a Digital Promise technology☆17Dec 22, 2025Updated last month
- ☆12Feb 4, 2025Updated last year
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 8 months ago
- ☆20Dec 24, 2025Updated last month
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- This is a article that will teach you the basics of the go programming language in coordination to the article im doing on robust and sec…☆10Aug 15, 2022Updated 3 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆12Jan 7, 2025Updated last year
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- Librados Mailbox☆10Sep 1, 2016Updated 9 years ago
- Native Shellcode Injector Via Handle Hijacking & Pool Party.☆13Apr 11, 2024Updated last year
- ☆11Dec 28, 2025Updated last month
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆14Jan 6, 2026Updated last month
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- A modern, reactive, open source ACI GUI☆18Nov 17, 2016Updated 9 years ago
- Ultimate List Of Bug Bounty Tools☆10Feb 25, 2023Updated 2 years ago
- ☆14Dec 12, 2020Updated 5 years ago
- ☆11Aug 25, 2023Updated 2 years ago
- Shellcode loader with evasion capabilities written in Nim☆14Jan 25, 2025Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12Mar 22, 2021Updated 4 years ago