vanhoefm / fragattacks
☆1,263Updated 2 months ago
Alternatives and similar repositories for fragattacks:
Users that are interested in fragattacks are comparing it to the libraries listed below
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 3 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆896Updated 2 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,922Updated 2 years ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,784Updated last year
- Network Analysis Tool☆3,220Updated last year
- CrackQ: A Python Hashcat cracking queue system☆934Updated 7 months ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,118Updated 4 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,753Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,838Updated 2 years ago
- ☆2,659Updated last year
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago
- A tool for IDN homograph attacks and detection.☆734Updated 4 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,282Updated 6 months ago
- All releases of the security research group (a.k.a. hackers) The Hacker's Choice☆708Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,084Updated 3 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆833Updated 3 months ago
- Capture handshakes of nearby WiFi networks automatically☆747Updated 3 years ago
- Fake Windows logon screen to steal passwords☆1,323Updated 5 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆796Updated 2 years ago
- A framework for constructing self-spreading binaries☆1,010Updated last year
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,112Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,462Updated this week
- Connect like there is no firewall. Securely.☆1,659Updated last week
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,874Updated 3 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,521Updated 5 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,389Updated 2 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,176Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,452Updated 4 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,537Updated last month
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,839Updated last year