n0mi1k / pmkidcrackerLinks
A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication
☆216Updated last year
Alternatives and similar repositories for pmkidcracker
Users that are interested in pmkidcracker are comparing it to the libraries listed below
Sorting:
- Living Off The Land (LOTL) persistent Reverse shell☆100Updated last year
- Bash Script to automate install of AWUS036ACH Wireless Alfa drivers instead of manually running every command. Works on Kali Linux/Debian…☆48Updated 3 weeks ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆450Updated last week
- Polymorphic Command & Control☆83Updated 2 months ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆109Updated 2 years ago
- Evil Crow Cable Pro device☆111Updated last month
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆296Updated 11 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 10 months ago
- Automated exploit scanner for cameras on the internet☆193Updated last year
- Xfinity / Comcast Wordlist Generator☆63Updated 2 years ago
- IoT Camera Reconnaissance and Live Viewer☆146Updated 10 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆109Updated last year
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Updated 2 years ago
- Turning smart lights into Wifi Hacking implants.☆122Updated 3 months ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆60Updated last year
- Persistent Powershell backdoor tool {😈}☆119Updated 10 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆103Updated 6 months ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆59Updated 2 years ago
- ☆95Updated 2 years ago
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆48Updated last year
- Browser streaming MITM proxy☆64Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆45Updated 10 months ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆35Updated this week
- Autofill Phishing☆72Updated 5 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆93Updated last year
- Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data☆15Updated 3 weeks ago
- Kali noise reduction tool☆315Updated last week
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆126Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆380Updated 4 months ago