Work in progress toolkit for KRACK attack.
☆70Mar 26, 2019Updated 6 years ago
Alternatives and similar repositories for KRACK-toolkit
Users that are interested in KRACK-toolkit are comparing it to the libraries listed below
Sorting:
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Krack POC☆126Apr 24, 2018Updated 7 years ago
- ESPHome and remote web server setup to display Home assistant dashboard on Waveshare ESP32-S3 Touch LCD 4 screen☆23Feb 15, 2026Updated 2 weeks ago
- An Attack Tool for TCP Session Hijacking☆12Nov 7, 2021Updated 4 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- Node.js DTLS Proxy, library and tools to connect plain-text UDP clients with plain-text UDP servers over an encrypted UDP tunnel..☆14Dec 2, 2018Updated 7 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆18Oct 30, 2014Updated 11 years ago
- WhatsApp forensics analysis and acquisition utility☆26Apr 2, 2013Updated 12 years ago
- A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng☆14Jan 1, 2019Updated 7 years ago
- ☆3,492Dec 25, 2024Updated last year
- Wifi-AP provides a library wrapper around hostapd and dnsmasq and their respective configuration files that allows for programmatically c…☆19Jun 17, 2015Updated 10 years ago
- Track yourself with "find my iPhone" - idea by http://www.leumund.ch/spy-myself-mit-find-my-iphone-0019390☆28Oct 26, 2013Updated 12 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Mar 10, 2023Updated 2 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- Social Engineering Tool Oriented to facebook☆58Apr 7, 2017Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Simple and convenient software for hacking other people's cams☆29Dec 11, 2017Updated 8 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.☆21Mar 5, 2020Updated 6 years ago
- Bacula (open source) containers for Docker☆25Apr 11, 2017Updated 8 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Oct 27, 2021Updated 4 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- HTTP botnet☆63Jul 30, 2016Updated 9 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Aug 27, 2019Updated 6 years ago
- cbReader - A simple web-based comic book reader (CBZ/CBR)☆10May 21, 2018Updated 7 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- A tool to generate media files with malicious metadata☆129Feb 2, 2019Updated 7 years ago
- An0n 3xPloiTeR Shell☆35Oct 4, 2019Updated 6 years ago
- JWT Attack to change the algorithm RS256 to HS256