kristate / krackinfoView external linksLinks
Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)
☆756Mar 23, 2018Updated 7 years ago
Alternatives and similar repositories for krackinfo
Users that are interested in krackinfo are comparing it to the libraries listed below
Sorting:
- ☆1,329May 25, 2023Updated 2 years ago
- ☆3,487Dec 25, 2024Updated last year
- A framework for wireless pentesting.☆1,228Oct 14, 2020Updated 5 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Oct 29, 2017Updated 8 years ago
- Remote shell/exfiltration using keyboard leds.☆26Jul 27, 2017Updated 8 years ago
- Defeating Google's audio reCaptcha with 85% accuracy.☆2,815Jan 27, 2018Updated 8 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆183Oct 20, 2017Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Sep 28, 2017Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Jul 11, 2017Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆249Nov 7, 2017Updated 8 years ago
- Seamlessly spy on SSH session like it is your tty☆349Sep 30, 2017Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Command line utility for searching and downloading exploits☆1,811Sep 10, 2025Updated 5 months ago
- Know the dangers of credential reuse attacks.☆2,087Dec 9, 2025Updated 2 months ago
- A Javascript library for browser exploitation☆894Feb 12, 2019Updated 7 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆143Oct 12, 2018Updated 7 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Mar 6, 2018Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Sep 10, 2018Updated 7 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆394Oct 11, 2017Updated 8 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,441Nov 26, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Krack POC☆126Apr 24, 2018Updated 7 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,098Aug 21, 2018Updated 7 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- Curated List of MitM frameworks on GitHub☆255Oct 1, 2017Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Apr 10, 2017Updated 8 years ago
- ROCA: Infineon RSA key vulnerability☆492Oct 19, 2023Updated 2 years ago
- ☆38Oct 17, 2017Updated 8 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Mar 9, 2021Updated 4 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆764Jun 22, 2020Updated 5 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,150Apr 18, 2020Updated 5 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆610May 17, 2021Updated 4 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,862Dec 29, 2022Updated 3 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,031Feb 3, 2020Updated 6 years ago