Evil client portion of EAP relay attack
☆219Jul 5, 2023Updated 2 years ago
Alternatives and similar repositories for wpa_sycophant
Users that are interested in wpa_sycophant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script for orchestrating mana rogue WiFi Access Points.☆246Feb 3, 2025Updated last year
- SensePost's modified hostapd for wifi attacks.☆607Aug 5, 2024Updated last year
- Docker images for learning wifi hacking☆70Oct 26, 2018Updated 7 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆85Oct 27, 2023Updated 2 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,480Sep 22, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- A repository with toy implementations of MSCHAPv2, MPEE and WPA/2 to understand EAP better☆38Apr 18, 2019Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Feb 4, 2019Updated 7 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- A WPA3 dictionary cracker☆356Jul 10, 2023Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- ☆76May 23, 2024Updated last year
- Modified hostapd to facilitate AP impersonation attacks☆518Jun 1, 2018Updated 7 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,652Oct 11, 2018Updated 7 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆184Jan 10, 2017Updated 9 years ago
- DPAPI looting remotely and locally in Python☆546Mar 13, 2026Updated last month
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 6 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆381Jul 25, 2019Updated 6 years ago
- ☆110May 14, 2018Updated 7 years ago
- ☆242Jun 15, 2024Updated last year
- ☆424Aug 29, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆170Jun 16, 2022Updated 3 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 11 months ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆298Oct 30, 2024Updated last year
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,080Mar 19, 2024Updated 2 years ago
- NTLMv1 Multitool☆662Mar 12, 2026Updated last month
- Phish password protected Excel-Files☆107Jan 17, 2024Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,942Nov 19, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆401Aug 15, 2025Updated 8 months ago
- A Python based ingestor for BloodHound☆2,373Oct 24, 2025Updated 5 months ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- Payload Generation Framework☆1,973Aug 21, 2024Updated last year
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆738Sep 3, 2025Updated 7 months ago
- ☄️ go-out - A Golang egress buster.☆127Feb 6, 2026Updated 2 months ago