A repository with toy implementations of MSCHAPv2, MPEE and WPA/2 to understand EAP better
☆38Apr 18, 2019Updated 6 years ago
Alternatives and similar repositories for understanding-eap
Users that are interested in understanding-eap are comparing it to the libraries listed below
Sorting:
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Zigbee receiver for SDR devices with GNU Radio☆12Mar 26, 2021Updated 4 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆245Feb 3, 2025Updated last year
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- ☆110May 14, 2018Updated 7 years ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 6 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- ☆33Oct 17, 2014Updated 11 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆33Nov 14, 2025Updated 4 months ago
- ☆22Oct 3, 2019Updated 6 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- A simple API monitor for Windbg☆65Apr 22, 2017Updated 8 years ago
- Random experiments and shenanigans☆13Dec 6, 2025Updated 3 months ago
- ☆16Jul 5, 2017Updated 8 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Sep 27, 2024Updated last year
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Marlowe makes it easier to trace a request through all of your application logs☆10Feb 27, 2024Updated 2 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Run TrustZone TAs outside the secure world.☆17Oct 14, 2025Updated 5 months ago
- The Core Exchange spec and generated server code☆14Dec 12, 2025Updated 3 months ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- The BUSSide Badge☆48Feb 9, 2022Updated 4 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- Alternative open source firmware for Broadcom based routers☆14Feb 15, 2026Updated last month
- ☆16Sep 26, 2016Updated 9 years ago
- ☆19Dec 31, 2025Updated 2 months ago
- Extend WSH functionality with Registration-Free COM☆26Feb 23, 2017Updated 9 years ago