Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC
☆63May 29, 2023Updated 2 years ago
Alternatives and similar repositories for wpa2-enterprise-attack
Users that are interested in wpa2-enterprise-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- WiFi Penetration Testing Guide☆690Dec 14, 2023Updated 2 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 3 weeks ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 6 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆182Apr 23, 2021Updated 4 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated 2 months ago
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆14May 1, 2020Updated 5 years ago
- ☆21Dec 4, 2019Updated 6 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Router WiFi key recovery/cracking tool with a twist.☆92Nov 2, 2018Updated 7 years ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆50Feb 23, 2026Updated last month
- A free script by sid that deauth all user from the network contiuosly forever☆54Apr 28, 2018Updated 7 years ago
- ☆17Apr 5, 2021Updated 4 years ago
- Refluxion -- MITM WPA attacks tool☆39Jul 18, 2020Updated 5 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- Tool for MSSQL relay audit and abuse☆59Dec 17, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- linikatz is a tool to attack AD on UNIX☆156Oct 19, 2023Updated 2 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- A tool to find security vulnerabilities in Xamarin.Android apps.☆12Mar 28, 2022Updated 4 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Oct 30, 2024Updated last year
- Check if MS-RPRN is remotely available with powershell/c#☆179Oct 21, 2018Updated 7 years ago
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Feb 27, 2026Updated last month
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆144Mar 9, 2024Updated 2 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 8 years ago
- Tinder user searcher and DB creation. Proof of concept for Tinder security team☆20Mar 26, 2019Updated 7 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago