☆136Apr 24, 2019Updated 6 years ago
Alternatives and similar repositories for dragonslayer
Users that are interested in dragonslayer are comparing it to the libraries listed below
Sorting:
- ☆65Jan 12, 2022Updated 4 years ago
- ☆133Aug 4, 2022Updated 3 years ago
- ☆29Dec 10, 2020Updated 5 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Mar 6, 2018Updated 7 years ago
- ☆17Sep 27, 2022Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆58Aug 25, 2024Updated last year
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Code for the AsiaCCS 2017 paper "Discovering Logical Vulnerabilities in the Wi-Fi Handshake using Model-Based Testing".☆13Oct 12, 2018Updated 7 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- ☆22Mar 4, 2025Updated 11 months ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Jun 21, 2021Updated 4 years ago
- ☆16Oct 17, 2019Updated 6 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- ☆3,489Dec 25, 2024Updated last year
- ☆20Aug 11, 2024Updated last year
- Evil client portion of EAP relay attack☆213Jul 5, 2023Updated 2 years ago
- ☆24Jan 21, 2022Updated 4 years ago
- Modification of help_crack.py from https://wpa-sec.stanev.org/☆22Oct 21, 2024Updated last year
- Public work for CVE-2019-0708☆291Nov 19, 2019Updated 6 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- Test WPA3 using virtual Wi-Fi interfaces☆51Jul 16, 2022Updated 3 years ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,325Updated this week
- ☆12Dec 26, 2022Updated 3 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Handy extensions to the Google Maps Android API.☆12Jul 3, 2016Updated 9 years ago
- Routopsy - Hacking Routers with Routers☆179Jul 30, 2021Updated 4 years ago
- Small tool to capture packets from wlan devices.☆2,086Feb 22, 2026Updated last week
- Script for orchestrating mana rogue WiFi Access Points.☆244Feb 3, 2025Updated last year
- Golang client for hunter.io☆10Feb 11, 2022Updated 4 years ago
- Converts hashcat .hccapx files back to .cap files☆12Feb 25, 2017Updated 9 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- ☆12Oct 15, 2024Updated last year
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago