Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)
☆757Mar 23, 2018Updated 8 years ago
Alternatives and similar repositories for krackinfo
Users that are interested in krackinfo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆1,329May 25, 2023Updated 2 years ago
- ☆3,496Dec 25, 2024Updated last year
- ABANDONED: Windows provides no mechanism for injecting packets☆28Oct 21, 2017Updated 8 years ago
- A framework for wireless pentesting.☆1,230Oct 14, 2020Updated 5 years ago
- ☆38Oct 17, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Proof of concepts of attacks against Wi-Fi implementations☆143Oct 12, 2018Updated 7 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Oct 29, 2017Updated 8 years ago
- Defeating Google's audio reCaptcha with 85% accuracy.☆2,815Jan 27, 2018Updated 8 years ago
- Krack POC☆126Apr 24, 2018Updated 7 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆468Sep 23, 2017Updated 8 years ago
- Remote shell/exfiltration using keyboard leds.☆26Jul 27, 2017Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Seamlessly spy on SSH session like it is your tty☆347Sep 30, 2017Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Apr 10, 2017Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Aug 21, 2018Updated 7 years ago
- Command line utility for searching and downloading exploits☆1,815Sep 10, 2025Updated 6 months ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 3 months ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆395Oct 11, 2017Updated 8 years ago
- ROCA: Infineon RSA key vulnerability☆491Oct 19, 2023Updated 2 years ago
- A Javascript library for browser exploitation☆896Feb 12, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- Work in progress toolkit for KRACK attack.☆70Mar 26, 2019Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,450Nov 26, 2018Updated 7 years ago
- Take full control of a OSX user or root account via command line.☆101May 18, 2018Updated 7 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,158Apr 18, 2020Updated 5 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆536Jun 5, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- PoC scripts demonstrating the BlueBorne vulnerabilities☆611May 17, 2021Updated 4 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Nov 29, 2017Updated 8 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆178Jul 21, 2020Updated 5 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆158Mar 6, 2018Updated 8 years ago
- Automated Mass Exploiter☆5,223May 22, 2023Updated 2 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- Curated List of MitM frameworks on GitHub☆256Oct 1, 2017Updated 8 years ago