lgrangeia / cupid
Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections
☆106Updated 10 years ago
Alternatives and similar repositories for cupid:
Users that are interested in cupid are comparing it to the libraries listed below
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- ☆20Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Projects and POCs☆60Updated 10 years ago
- ☆47Updated 9 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 11 years ago
- Web Filter External Enumeration Tool (WebFEET)☆76Updated 10 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- UPnP hacking scripts and tools☆76Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- ☆18Updated last year
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago