☆136Aug 4, 2022Updated 3 years ago
Alternatives and similar repositories for dragondrain-and-time
Users that are interested in dragondrain-and-time are comparing it to the libraries listed below
Sorting:
- ☆65Jan 12, 2022Updated 4 years ago
- ☆137Apr 24, 2019Updated 6 years ago
- ☆29Dec 10, 2020Updated 5 years ago
- ☆17Sep 27, 2022Updated 3 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆158Mar 6, 2018Updated 8 years ago
- Plugins for airgeddon☆47Nov 4, 2025Updated 4 months ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Jun 21, 2021Updated 4 years ago
- ☆16Oct 17, 2019Updated 6 years ago
- ☆26Aug 20, 2021Updated 4 years ago
- SensePost's modified hostapd for wifi attacks.☆601Aug 5, 2024Updated last year
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- ☆1,285Apr 29, 2025Updated 10 months ago
- The hassle free configuration manager - MIGRATED TO https://gitlab.com/fizzycfg☆11Mar 11, 2018Updated 7 years ago
- Scan for AirTag MACs and Payloads without the need for an Android device or nrfConnect.☆16Oct 13, 2025Updated 4 months ago
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Mar 10, 2023Updated 2 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- Test WPA3 using virtual Wi-Fi interfaces☆51Jul 16, 2022Updated 3 years ago
- Network Forensic Extendable Analysis Tool☆39May 22, 2022Updated 3 years ago
- Modified hostapd to facilitate AP impersonation attacks☆518Jun 1, 2018Updated 7 years ago
- A WPA3 dictionary cracker☆350Jul 10, 2023Updated 2 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- Fork of the kernel backports repository☆12Aug 5, 2025Updated 7 months ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Dragon Drain attack packaged as airgeddon plugin☆30Jan 30, 2026Updated last month
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Feb 3, 2025Updated last year
- Small tool to capture packets from wlan devices.☆2,091Feb 28, 2026Updated last week
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆84Oct 27, 2023Updated 2 years ago
- Krack POC☆126Apr 24, 2018Updated 7 years ago