kristate / krackinfo
Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)
☆747Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for krackinfo
- ☆1,325Updated last year
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,097Updated 5 years ago
- Seamlessly spy on SSH session like it is your tty☆351Updated 7 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆761Updated 4 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆574Updated 7 years ago
- A framework for wireless pentesting.☆1,194Updated 4 years ago
- SSH man-in-the-middle tool☆1,623Updated 3 years ago
- A subdomain enumeration tool.☆894Updated 3 years ago
- ROCA: Infineon RSA key vulnerability☆481Updated last year
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- ultrafast single TCP packet audio/visual experience☆1,394Updated 2 months ago
- MAC address age tracking☆575Updated this week
- ☆350Updated 3 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,022Updated 4 years ago
- WarBerryPi - Tactical Exploitation☆2,219Updated 5 years ago
- Wannacry in-memory key recovery☆1,061Updated 7 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆439Updated 6 years ago
- All your IPs are belong to us.☆667Updated 6 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆511Updated 6 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆904Updated 7 years ago
- Various PoCs☆489Updated 4 years ago