Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)
☆758Mar 23, 2018Updated 8 years ago
Alternatives and similar repositories for krackinfo
Users that are interested in krackinfo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆1,329May 25, 2023Updated 2 years ago
- ☆3,498Dec 25, 2024Updated last year
- ABANDONED: Windows provides no mechanism for injecting packets☆28Oct 21, 2017Updated 8 years ago
- A framework for wireless pentesting.☆1,236Oct 14, 2020Updated 5 years ago
- ☆38Oct 17, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Proof of concepts of attacks against Wi-Fi implementations☆142Oct 12, 2018Updated 7 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Oct 29, 2017Updated 8 years ago
- Defeating Google's audio reCaptcha with 85% accuracy.☆2,812Jan 27, 2018Updated 8 years ago
- Krack POC☆126Apr 24, 2018Updated 8 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- Remote shell/exfiltration using keyboard leds.☆26Jul 27, 2017Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆468Sep 23, 2017Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Seamlessly spy on SSH session like it is your tty☆347Sep 30, 2017Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Apr 10, 2017Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,098Aug 21, 2018Updated 7 years ago
- Command line utility for searching and downloading exploits☆1,808Sep 10, 2025Updated 7 months ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 4 months ago
- A Javascript library for browser exploitation☆898Feb 12, 2019Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆312Sep 10, 2018Updated 7 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆396Oct 11, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ROCA: Infineon RSA key vulnerability☆492Oct 19, 2023Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- Work in progress toolkit for KRACK attack.☆70Mar 26, 2019Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,460Nov 26, 2018Updated 7 years ago
- Take full control of a OSX user or root account via command line.☆101May 18, 2018Updated 7 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,155Apr 18, 2020Updated 6 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆536Jun 5, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆179Jul 21, 2020Updated 5 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- Automated Mass Exploiter☆5,237May 22, 2023Updated 2 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆611May 17, 2021Updated 4 years ago
- Curated List of MitM frameworks on GitHub☆257Oct 1, 2017Updated 8 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Nov 29, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago