n0mi1k / pmkidcrackerLinks
A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication 
☆220Updated 2 years ago
Alternatives and similar repositories for pmkidcracker
Users that are interested in pmkidcracker are comparing it to the libraries listed below
Sorting:
- Learn how to set up a fake authentication web page on a fake WiFi network.☆116Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆333Updated last year
- IoT Camera Reconnaissance and Live Viewer☆164Updated last year
- Automated exploit scanner for cameras on the internet☆206Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- Open-Source Phishing Toolkit☆244Updated 3 months ago
- Browser streaming MITM proxy☆74Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆75Updated last week
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆101Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆113Updated this week
- The program for scanning and testing city cameras (DVR, RTSP, Hikvision) is a tool developed exclusively for educational purposes to anal…☆97Updated 7 months ago
- ☆159Updated 2 years ago
- NetProbe: Network Probe☆164Updated last year
- Fork from @rsmudge/armitage☆137Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆105Updated 2 years ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆79Updated last year
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆166Updated 3 months ago
- Evil Crow Cable Pro device☆120Updated last week
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆115Updated this week
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆78Updated 7 months ago
- Bash Script to automate install of AWUS036ACH Wireless Alfa drivers instead of manually running every command. Works on Kali Linux/Debian…☆56Updated 5 months ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆69Updated 2 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆276Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆49Updated last year