jselvi / Delorean
NTP Main-in-the-Middle tool
☆242Updated 2 years ago
Alternatives and similar repositories for Delorean:
Users that are interested in Delorean are comparing it to the libraries listed below
- SSLStrip version to defeat HSTS☆316Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆517Updated 7 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆179Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆235Updated last year
- A modified frequency regulatory domain configuration that doesn't limit you.☆168Updated 8 years ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 7 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆254Updated 7 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆355Updated 2 years ago
- ☆219Updated 8 months ago
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆153Updated 6 years ago
- Modified hostapd to facilitate AP impersonation attacks☆502Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆488Updated 3 years ago
- application server attack toolkit☆686Updated 4 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 4 months ago
- Specify targets and run sets of tools against them☆387Updated 5 years ago
- Offensive DNS server☆315Updated 3 years ago
- Detect and prevent KRACK attacks in your network☆181Updated 7 years ago
- Database of private SSL/SSH keys for embedded devices☆256Updated last year
- Shodan HQ nmap plugin - passively scan targets☆152Updated 8 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆344Updated 8 years ago
- This repository contains some bettercap transparent proxy example modules.☆282Updated 6 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆139Updated 2 years ago
- ☆378Updated 12 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆247Updated 10 years ago
- WPS related utilities☆164Updated 9 years ago
- ☆140Updated 8 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago