vanhoefm / broadkey
Attacks against weak 802.11 Random Number Generators
☆24Updated 8 years ago
Alternatives and similar repositories for broadkey:
Users that are interested in broadkey are comparing it to the libraries listed below
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago
- apbleed☆24Updated 10 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- IP Address Listing Tool☆12Updated 11 years ago
- ☆15Updated 8 years ago
- Password cracking utility☆53Updated 3 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 9 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆30Updated 11 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 2 years ago
- Agent part of Hashtopus☆17Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 12 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆19Updated 10 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Updated 3 years ago
- log file scrubber☆16Updated 6 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago