sensepost / wpa_sycophantView external linksLinks
Evil client portion of EAP relay attack
☆213Jul 5, 2023Updated 2 years ago
Alternatives and similar repositories for wpa_sycophant
Users that are interested in wpa_sycophant are comparing it to the libraries listed below
Sorting:
- Script for orchestrating mana rogue WiFi Access Points.☆244Feb 3, 2025Updated last year
- SensePost's modified hostapd for wifi attacks.☆599Aug 5, 2024Updated last year
- Docker images for learning wifi hacking☆69Oct 26, 2018Updated 7 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆84Oct 27, 2023Updated 2 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,460Sep 22, 2024Updated last year
- A repository with toy implementations of MSCHAPv2, MPEE and WPA/2 to understand EAP better☆38Apr 18, 2019Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Feb 4, 2019Updated 7 years ago
- ☆76May 23, 2024Updated last year
- Modified hostapd to facilitate AP impersonation attacks☆518Jun 1, 2018Updated 7 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,637Oct 11, 2018Updated 7 years ago
- DPAPI looting remotely and locally in Python☆540Oct 7, 2025Updated 4 months ago
- A WPA3 dictionary cracker☆349Jul 10, 2023Updated 2 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆381Jul 25, 2019Updated 6 years ago
- Phish password protected Excel-Files☆107Jan 17, 2024Updated 2 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆169Jun 16, 2022Updated 3 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- Maximizing BloodHound. Max is a good boy.☆531Apr 25, 2025Updated 9 months ago
- ☆110May 14, 2018Updated 7 years ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆177Jan 10, 2017Updated 9 years ago
- ☆425Aug 29, 2017Updated 8 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,073Mar 19, 2024Updated last year
- NTLMv1 Multitool☆662Nov 30, 2025Updated 2 months ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- ☆30Jul 17, 2018Updated 7 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,903Nov 19, 2025Updated 2 months ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Oct 30, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- HTA encryption tool for RedTeams☆1,424Nov 9, 2022Updated 3 years ago