Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC
☆63May 29, 2023Updated 2 years ago
Alternatives and similar repositories for wpa2-enterprise-attack
Users that are interested in wpa2-enterprise-attack are comparing it to the libraries listed below
Sorting:
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 6 years ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆48Feb 23, 2026Updated 2 weeks ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Sep 30, 2025Updated 5 months ago
- C Projects☆11May 7, 2020Updated 5 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- All Apprentice and Practitioner-level Portswigger labs☆32May 18, 2023Updated 2 years ago
- Refluxion -- MITM WPA attacks tool☆39Jul 18, 2020Updated 5 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- A tool to find security vulnerabilities in Xamarin.Android apps.☆12Mar 28, 2022Updated 3 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆181Apr 23, 2021Updated 4 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆12May 1, 2020Updated 5 years ago
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Feb 27, 2026Updated last week
- linikatz is a tool to attack AD on UNIX☆155Oct 19, 2023Updated 2 years ago
- EMQX Dashboard Malicious Plugin leading to RCE☆47Jun 16, 2025Updated 8 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- Random scripts that I used in the CARTP course lab & final exam.☆14Feb 28, 2024Updated 2 years ago
- ☆18Jun 25, 2024Updated last year
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Oct 30, 2024Updated last year
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆143Mar 9, 2024Updated 2 years ago
- ☆36Oct 16, 2023Updated 2 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 5 months ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆12Dec 31, 2022Updated 3 years ago