sensepost / hostapd-mana
SensePost's modified hostapd for wifi attacks.
☆560Updated 6 months ago
Alternatives and similar repositories for hostapd-mana:
Users that are interested in hostapd-mana are comparing it to the libraries listed below
- Modified hostapd to facilitate AP impersonation attacks☆502Updated 6 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆237Updated 2 weeks ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆288Updated 3 months ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,091Updated 6 years ago
- Easy 802.1Q VLAN Hopping☆373Updated 8 years ago
- Smart Install Exploitation Tool☆575Updated 3 years ago
- Evil client portion of EAP relay attack☆196Updated last year
- caplets and proxy modules.☆491Updated 3 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 4 months ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆377Updated last year
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆854Updated 7 years ago
- JackIt - Exploit Code for Mousejack☆828Updated 4 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,261Updated 4 months ago
- A Software Defined Radio Attack Tool☆532Updated last month
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆536Updated 5 years ago
- ☆219Updated 8 months ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆493Updated 7 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆247Updated 10 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆453Updated 5 years ago
- coWPAtty: WPA2-PSK Cracking☆198Updated 6 years ago
- ☆114Updated 2 years ago
- intercepting kali router☆438Updated 7 years ago
- Windows passwords decryption from dump files☆492Updated 2 years ago
- Modern tactical exploitation toolkit.☆841Updated 7 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 7 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,416Updated 2 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆153Updated 6 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆251Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 3 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆536Updated 8 years ago