☆140Apr 24, 2019Updated 6 years ago
Alternatives and similar repositories for dragonslayer
Users that are interested in dragonslayer are comparing it to the libraries listed below
Sorting:
- ☆65Jan 12, 2022Updated 4 years ago
- ☆136Aug 4, 2022Updated 3 years ago
- ☆29Dec 10, 2020Updated 5 years ago
- ☆17Sep 27, 2022Updated 3 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆158Mar 6, 2018Updated 8 years ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆62Aug 25, 2024Updated last year
- ☆12Dec 26, 2022Updated 3 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- ☆16Oct 17, 2019Updated 6 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- ☆12Oct 5, 2025Updated 5 months ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Jun 21, 2021Updated 4 years ago
- Krack POC☆126Apr 24, 2018Updated 7 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- Code for the AsiaCCS 2017 paper "Discovering Logical Vulnerabilities in the Wi-Fi Handshake using Model-Based Testing".☆13Oct 12, 2018Updated 7 years ago
- ☆3,496Dec 25, 2024Updated last year
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- ☆22Mar 4, 2025Updated last year
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆84Oct 27, 2023Updated 2 years ago
- ☆1,289Apr 29, 2025Updated 10 months ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,342Mar 13, 2026Updated last week
- Awesome Hacking☆20Nov 9, 2018Updated 7 years ago
- Small tool to capture packets from Bluetooth devices.☆55Jan 3, 2024Updated 2 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- ☆484Oct 18, 2025Updated 5 months ago
- Modification of help_crack.py from https://wpa-sec.stanev.org/☆22Oct 21, 2024Updated last year
- re-implements window.crypto.signText and exposes it to content☆11Aug 7, 2019Updated 6 years ago
- A WPA3 dictionary cracker☆350Jul 10, 2023Updated 2 years ago
- Small tool to capture packets from wlan devices.☆2,100Mar 10, 2026Updated last week
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- new WPS attack tool☆60Sep 13, 2015Updated 10 years ago
- ☆1,924Oct 31, 2025Updated 4 months ago
- Yet another Multipurpose Breakout Board to hack hardware in a clean and easy way☆34Sep 22, 2023Updated 2 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago