lgrangeia / cupid
Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections
☆106Updated 10 years ago
Alternatives and similar repositories for cupid:
Users that are interested in cupid are comparing it to the libraries listed below
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- ☆20Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Projects and POCs☆60Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- ☆28Updated 4 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 11 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 5 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 7 years ago
- Carve shellcode within the memory using restrictive character set☆8Updated 7 years ago
- Network based protocol fuzzer☆70Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆43Updated 6 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- Small scripts to assist in pentesting☆19Updated 4 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- Create lists from nmap output.☆13Updated 4 years ago