lucascouto / krackattack-all-zero-tk-keyLinks
This code has base on a code made by Mathy Vanhoef (https://github.com/vanhoefm/krackattacks-poc-zerokey). Please, take a look on README.md. Enjoy!
☆52Updated 7 years ago
Alternatives and similar repositories for krackattack-all-zero-tk-key
Users that are interested in krackattack-all-zero-tk-key are comparing it to the libraries listed below
Sorting:
- Krack POC☆125Updated 7 years ago
- ☆62Updated 4 years ago
- P4wnP1 - WiFi covert channel - Client agent (experimental Proof of Concept) by MaMe82☆85Updated 7 years ago
- new WPS attack tool☆60Updated 10 years ago
- A Python and ruby script to automate rogue AP process☆50Updated last year
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆107Updated 2 years ago
- A smart jamming proof of concept for mobile equipments that could be powered with Modmobmap tool☆101Updated 5 years ago
- ☆58Updated 5 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆100Updated 8 years ago
- A repo containing the OpenWRT SDK Makfiles for 'hcxdumptool', and 'hcxtools' with pre-compiled packages.☆47Updated 3 years ago
- EVILSPLOIT – A UNIVERSAL HARDWARE HACKING TOOLKIT☆94Updated 7 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆159Updated 8 years ago
- Small set of tools to generate plainmasterkeys (rainbowtables) and hashes for the use with latest hashcat and John the Ripper.☆115Updated 2 years ago
- WIG (WiFi Information Gathering) is a free and open source utility for WiFi device fingerprinting.☆38Updated 3 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆86Updated 8 years ago
- UPnP hacking scripts and tools☆77Updated 9 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆156Updated 7 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 7 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- giskismet – Wireless recon visualization tool☆55Updated 9 years ago
- The Nmap Scanner for Telco☆166Updated 7 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆89Updated 7 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆64Updated 3 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆117Updated 7 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Updated 7 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 9 years ago
- BadUSB in Routers☆198Updated 3 years ago
- Locating Roaming location of a number, and collecting msisdn and opeartor related infromation (IMSI, HLR GT, MSC GT)☆84Updated 7 years ago