n0mi1k / pmkidcracker
A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication
☆210Updated last year
Alternatives and similar repositories for pmkidcracker:
Users that are interested in pmkidcracker are comparing it to the libraries listed below
- Living Off The Land (LOTL) persistent Reverse shell☆96Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆285Updated 9 months ago
- IoT Camera Reconnaissance and Live Viewer☆138Updated 7 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆94Updated 3 months ago
- Automated exploit scanner for cameras on the internet☆188Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆399Updated 3 weeks ago
- Evil Crow Cable Pro device☆102Updated 2 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆356Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 8 months ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆106Updated last year
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆57Updated last year
- ☆88Updated 2 years ago
- Polymorphic Command & Control☆74Updated 2 weeks ago
- ☆286Updated 9 months ago
- Turning smart lights into Wifi Hacking implants.☆117Updated last month
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆165Updated 9 months ago
- This is a shell script that creates an SSH backdoor on an iPhone.☆217Updated 5 months ago
- Open-Source Phishing Toolkit☆165Updated 5 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 6 months ago
- What the name says....☆91Updated 6 months ago
- Autofill Phishing☆62Updated 3 months ago
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆47Updated 11 months ago
- Repo containing cracked red teaming tools.☆156Updated last week
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- Persistent Powershell backdoor tool {😈}☆116Updated 7 months ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Tool for hiding Kali Linux on the network☆309Updated 10 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆167Updated 7 months ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆63Updated 2 years ago