kristate / krackinfo
Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)
☆751Updated 6 years ago
Alternatives and similar repositories for krackinfo:
Users that are interested in krackinfo are comparing it to the libraries listed below
- ☆1,331Updated last year
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- A framework for wireless pentesting.☆1,203Updated 4 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆764Updated 4 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,094Updated 6 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- Various PoCs☆490Updated 5 years ago
- ☆469Updated 6 months ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆579Updated 7 years ago
- ROCA: Infineon RSA key vulnerability☆483Updated last year
- SSH man-in-the-middle tool☆1,647Updated 3 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Updated 8 years ago
- ☆3,389Updated 2 months ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆652Updated 3 months ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆493Updated 7 years ago
- Detect and prevent KRACK attacks in your network☆181Updated 7 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- Wannacry in-memory key recovery☆1,081Updated 7 years ago
- ☆351Updated 3 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 6 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,026Updated 5 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆447Updated 6 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆234Updated 2 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,669Updated 5 years ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆311Updated 5 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,089Updated 6 years ago
- DEPRECATED: Monitor Mode and Firmware patching framework for the Raspberry Pi 3, development moved to: https://github.com/seemoo-lab/nexm…☆158Updated 5 years ago
- Automated wanadecrypt with key recovery if lucky☆789Updated 7 years ago