n0mi1k / pmkidcrackerView external linksLinks
A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication
☆225Jun 10, 2023Updated 2 years ago
Alternatives and similar repositories for pmkidcracker
Users that are interested in pmkidcracker are comparing it to the libraries listed below
Sorting:
- A python tool to test for web cache poisoning denial of service (CPDoS) vulnerabilities.☆15Oct 19, 2023Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- A WiFi security auditing software mainly based on aircrack-ng tools suite☆355Nov 18, 2025Updated 2 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 6 months ago
- self-hosted Azure OSINT tool☆32Jun 24, 2025Updated 7 months ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆50Feb 22, 2024Updated last year
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 weeks ago
- IoT Camera Reconnaissance and Live Viewer☆171Jul 30, 2024Updated last year
- WPA cracking tool for Android☆10Jul 17, 2020Updated 5 years ago
- ☆18Oct 15, 2024Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Jun 10, 2024Updated last year
- RansomwareSim is a simulated ransomware☆170May 31, 2024Updated last year
- ☆13Mar 1, 2024Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,398Jan 19, 2026Updated 3 weeks ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆27Jun 19, 2020Updated 5 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Network Security Sniffer☆840Jan 2, 2026Updated last month
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Updated this week
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 2 years ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆95Jan 16, 2026Updated 3 weeks ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Mar 15, 2024Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Dec 23, 2025Updated last month
- BackdoorSim: An Educational into Remote Administration Tools☆119Feb 7, 2024Updated 2 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated last year
- APK Infrastructure Investigator☆65Jun 20, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆41Oct 18, 2023Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆78Mar 28, 2024Updated last year
- An automatic Blind ROP exploitation tool☆208Jun 9, 2023Updated 2 years ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 9 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago
- Automated WPA/WPA2 PSK attack tool.☆623Aug 21, 2021Updated 4 years ago