A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability
☆62Aug 25, 2024Updated last year
Alternatives and similar repositories for DragonShift
Users that are interested in DragonShift are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Aug 20, 2021Updated 4 years ago
- Dragon Drain attack packaged as airgeddon plugin☆33Mar 11, 2026Updated 2 weeks ago
- ☆140Apr 24, 2019Updated 6 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- A super fast number dictionary generator (2M+ lines per second) to aid numeric dictionary-based attacks. This project uses multiprocessin…☆28Aug 25, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A simple GDB server for jailbroken PS4s and PS5s☆12Dec 21, 2025Updated 3 months ago
- ☆13Jan 27, 2024Updated 2 years ago
- game of active directory (SnapLabs version)☆16Aug 12, 2025Updated 7 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆76Updated this week
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 4 months ago
- ZXCVBN Password Strength Estimation with Czech or Slovak Dictionaries☆15Jun 14, 2017Updated 8 years ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆32Mar 15, 2022Updated 4 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆50Feb 28, 2026Updated last month
- Easy bluetooth RFCOMM and OBEX connection for Android☆12Jul 27, 2020Updated 5 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆13Nov 24, 2025Updated 4 months ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- ☆26Aug 11, 2025Updated 7 months ago
- ☆12Feb 4, 2025Updated last year
- High-performance 3d game engine with Vulkan backend [WIP]☆14Jan 4, 2026Updated 2 months ago
- Blockchain Challs from HACON2020 CTF☆13Sep 22, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆45Nov 19, 2025Updated 4 months ago
- ESPHome component for reading/writing information to Broan ERVs via serial☆27Updated this week
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆24Feb 24, 2022Updated 4 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains.…☆21Dec 29, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆23Nov 29, 2023Updated 2 years ago
- early cascade injection PoC based on Outflanks blog post☆240Nov 7, 2024Updated last year
- ☆17Aug 26, 2024Updated last year
- ☆59Nov 13, 2024Updated last year
- Golang implementation of @CCob's C# ThreadlessInject☆31May 11, 2024Updated last year
- ☆21Feb 22, 2025Updated last year
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago