rofl0r / wpakeyLinks
monitor mode wpa/wpa2 password bruteforcer
☆17Updated 6 years ago
Alternatives and similar repositories for wpakey
Users that are interested in wpakey are comparing it to the libraries listed below
Sorting:
- Some NSE scripts to search information from routers☆10Updated 9 years ago
- Broadpwn bug (CVE-2017-9417)☆52Updated 8 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 11 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- Attacking WPA/WPA encrypted access point without client.☆50Updated 11 years ago
- new WPS attack tool☆57Updated 10 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆99Updated 8 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- Misc scripts and tools for WiFi☆106Updated 4 years ago
- WIG (WiFi Information Gathering) is a free and open source utility for WiFi device fingerprinting.☆37Updated 2 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆168Updated 7 years ago
- Python - Human Interface Device Android Attack Framework☆47Updated 8 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Updated 3 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 7 years ago
- DEPRECATED: Monitor Mode and Firmware patching framework for the Google Nexus 5, development moved to: https://github.com/seemoo-lab/nexm…☆78Updated 2 years ago
- ☆32Updated 10 years ago
- UPnP hacking scripts and tools☆76Updated 8 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 11 years ago
- Fake AccessPoint Attack☆30Updated 7 years ago
- Password cracking utility☆53Updated 4 years ago
- WPS scan and pwn tool☆70Updated 5 years ago
- WPS related utilities☆165Updated 10 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆76Updated 7 years ago
- Wi-Fi Backdoors☆39Updated 10 years ago
- Meteor package for client + server side IMSI-catcher detection.☆20Updated 9 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆63Updated 6 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago