Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC
☆64May 29, 2023Updated 2 years ago
Alternatives and similar repositories for wpa2-enterprise-attack
Users that are interested in wpa2-enterprise-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- WiFi Penetration Testing Guide☆701Dec 14, 2023Updated 2 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆24Feb 17, 2024Updated 2 years ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆183Apr 23, 2021Updated 5 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 3 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated last year
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆15May 1, 2020Updated 6 years ago
- ☆21Dec 4, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated last year
- Small Linux command-line tool to "ping" 802.11 devices☆28Aug 29, 2012Updated 13 years ago
- BypassCredGuard CS BOF☆53Jan 23, 2025Updated last year
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated 2 years ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆51Feb 23, 2026Updated 2 months ago
- A free script by sid that deauth all user from the network contiuosly forever☆55Apr 28, 2018Updated 8 years ago
- ☆17Apr 5, 2021Updated 5 years ago
- Refluxion -- MITM WPA attacks tool☆40Jul 18, 2020Updated 5 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆68Oct 31, 2021Updated 4 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- linikatz is a tool to attack AD on UNIX☆156Oct 19, 2023Updated 2 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- A tool to find security vulnerabilities in Xamarin.Android apps.☆12Mar 28, 2022Updated 4 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆299Oct 30, 2024Updated last year
- Check if MS-RPRN is remotely available with powershell/c#☆180Oct 21, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆34Jul 5, 2025Updated 10 months ago
- Library of sites for categorization☆29Feb 12, 2019Updated 7 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆147Mar 9, 2024Updated 2 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- Spy-Bot: A Cloud Penetration Testing Approach for Wireless Penetration Testing.☆18Nov 2, 2017Updated 8 years ago