sensepost / wpa_sycophantLinks
Evil client portion of EAP relay attack
☆202Updated 2 years ago
Alternatives and similar repositories for wpa_sycophant
Users that are interested in wpa_sycophant are comparing it to the libraries listed below
Sorting:
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆190Updated 5 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Updated 6 months ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆259Updated 2 years ago
- This is a bash script to bypass 802.1x NAC☆100Updated 2 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Updated 8 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆293Updated 9 months ago
- ☆237Updated 4 years ago
- ☆225Updated last year
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆304Updated last year
- ☆150Updated 2 years ago
- Passive internal reconnaissance tool☆72Updated 2 years ago
- An SNMPv3 User Enumerator and Attack tool☆255Updated 4 years ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆404Updated last year
- This is a weaponized WSUS exploit☆286Updated 2 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆78Updated last year
- Responder for Python3☆100Updated 5 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆74Updated 6 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆287Updated last year
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆40Updated 5 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.