vanhoefm / dragondrain-and-time
☆119Updated 2 years ago
Alternatives and similar repositories for dragondrain-and-time:
Users that are interested in dragondrain-and-time are comparing it to the libraries listed below
- ☆62Updated 3 years ago
- ☆127Updated 6 years ago
- Evil client portion of EAP relay attack☆202Updated last year
- Small set of tools to generate plainmasterkeys (rainbowtables) and hashes for the use with latest hashcat and John the Ripper.☆112Updated last year
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆290Updated 6 months ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 3 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆102Updated 2 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆242Updated 3 months ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆112Updated 6 years ago
- SensePost's modified hostapd for wifi attacks.☆568Updated 9 months ago
- A smart jamming proof of concept for mobile equipments that could be powered with Modmobmap tool☆88Updated 4 years ago
- ☆224Updated 10 months ago
- Krack POC☆124Updated 7 years ago
- Mobile UI for kismet☆179Updated 7 months ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆95Updated 8 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- P4wnP1 - WiFi covert channel - Client agent (experimental Proof of Concept) by MaMe82☆84Updated 7 years ago
- ☆26Updated 4 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 5 months ago
- SSLStrip version to defeat HSTS☆69Updated 2 years ago
- Blue Hydra☆72Updated 5 months ago
- The Nmap Scanner for Telco☆162Updated 6 years ago
- Docker images for learning wifi hacking☆66Updated 6 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆172Updated 8 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆117Updated 6 years ago
- The Bluetooth penetration testing tool suite☆120Updated 5 years ago
- new WPS attack tool☆55Updated 9 years ago
- An nmap NSE script which is able to detect and enumerate (dump payloads and settings) of O.MG cables, connected to defender controlled ne…☆47Updated 5 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆253Updated 6 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Updated 8 years ago