A repository with toy implementations of MSCHAPv2, MPEE and WPA/2 to understand EAP better
☆38Apr 18, 2019Updated 6 years ago
Alternatives and similar repositories for understanding-eap
Users that are interested in understanding-eap are comparing it to the libraries listed below
Sorting:
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Evil client portion of EAP relay attack☆213Jul 5, 2023Updated 2 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Zigbee receiver for SDR devices with GNU Radio☆12Mar 26, 2021Updated 4 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- A simple API monitor for Windbg☆65Apr 22, 2017Updated 8 years ago
- ☆110May 14, 2018Updated 7 years ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- ☆22Oct 3, 2019Updated 6 years ago
- Run TrustZone TAs outside the secure world.☆17Oct 14, 2025Updated 4 months ago
- ☆33Oct 17, 2014Updated 11 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Sep 27, 2024Updated last year
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 5 years ago
- A tool for comparing cellular layer 3 protocol messages between the specification documents and baseband implementations☆50Mar 2, 2021Updated 5 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Extend WSH functionality with Registration-Free COM☆26Feb 23, 2017Updated 9 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- ☆74Jan 25, 2018Updated 8 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Nov 21, 2020Updated 5 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated last month
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- BGP Route Leaks Detection☆71Dec 7, 2018Updated 7 years ago
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago