sensepost / hostapd-mana
SensePost's modified hostapd for wifi attacks.
☆548Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for hostapd-mana
- Modified hostapd to facilitate AP impersonation attacks☆496Updated 6 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆227Updated 2 months ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆286Updated 3 weeks ago
- JackIt - Exploit Code for Mousejack☆811Updated 4 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,086Updated 6 years ago
- Evil client portion of EAP relay attack☆191Updated last year
- ☆109Updated 2 years ago
- caplets and proxy modules.☆484Updated 2 weeks ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆352Updated last month
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,196Updated last month
- Smart Install Exploitation Tool☆572Updated 2 years ago
- bettercap's web UI☆320Updated this week
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆493Updated 7 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆851Updated 7 years ago
- ☆213Updated 5 months ago
- An Android app that lets you use your access control card cloning devices in the field.☆444Updated 5 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆528Updated 7 years ago
- Easy 802.1Q VLAN Hopping☆364Updated 8 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆528Updated 4 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆513Updated 3 years ago
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆252Updated last year
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆243Updated 10 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆152Updated 6 years ago
- Plugins for Metasploit Framework☆426Updated 5 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,398Updated last year
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 4 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,225Updated 2 years ago
- Windows passwords decryption from dump files☆483Updated last year
- ☆121Updated 5 years ago