☆1,285Apr 29, 2025Updated 10 months ago
Alternatives and similar repositories for fragattacks
Users that are interested in fragattacks are comparing it to the libraries listed below
Sorting:
- Modified drivers to reliably perform fragmentation and aggregation vulnerability tests☆12Jan 7, 2023Updated 3 years ago
- ☆3,492Dec 25, 2024Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,466Sep 22, 2024Updated last year
- ☆136Aug 4, 2022Updated 3 years ago
- Common python and scapy scripts for Wi-Fi☆66Dec 22, 2025Updated 2 months ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆828Jun 12, 2021Updated 4 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,883Feb 27, 2026Updated last week
- A sniffer for Bluetooth 5 and 4.x LE☆1,096Sep 25, 2025Updated 5 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,515Updated this week
- A swiss army knife for pentesting networks☆9,086Dec 6, 2023Updated 2 years ago
- A WPA3 dictionary cracker☆350Jul 10, 2023Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,361Jan 26, 2026Updated last month
- Proof-of-concept of the KRACK attack against Linux and Android☆158Mar 6, 2018Updated 8 years ago
- pwning IPv4 via IPv6☆1,888Feb 20, 2024Updated 2 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,967Jul 20, 2021Updated 4 years ago
- ☆2,511Jan 2, 2023Updated 3 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆799Apr 22, 2022Updated 3 years ago
- ☆137Apr 24, 2019Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆808Aug 28, 2022Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,644Aug 28, 2025Updated 6 months ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆221Mar 22, 2020Updated 5 years ago
- A little tool to play with Windows security☆21,300May 11, 2025Updated 9 months ago
- ☆65Jan 12, 2022Updated 4 years ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,186Aug 15, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,384Updated this week
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,965Jan 14, 2023Updated 3 years ago
- CVE-2021-40444 PoC☆1,719Dec 25, 2021Updated 4 years ago
- Network Analysis Tool☆3,332Apr 10, 2023Updated 2 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆805May 19, 2024Updated last year
- Test tool for CVE-2020-1472☆1,806Jun 27, 2025Updated 8 months ago
- MacStealer: Wi-Fi Client Isolation Bypass☆533Dec 17, 2025Updated 2 months ago
- Exploitation Framework for Embedded Devices☆13,014Updated this week
- A Series of Baseband & LMP Exploits against Bluetooth Classic Controllers☆546Aug 31, 2024Updated last year
- Owfuzz: a WiFi protocol fuzzing tool☆248Feb 15, 2023Updated 3 years ago
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,550Feb 19, 2026Updated 2 weeks ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit☆823Oct 11, 2023Updated 2 years ago
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,545Updated this week