vanhoefm / fragattacks
☆1,232Updated last year
Related projects ⓘ
Alternatives and complementary repositories for fragattacks
- Drone pentesting framework console☆1,443Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,196Updated last month
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,795Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆795Updated 2 years ago
- ☆2,492Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,044Updated 3 years ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆405Updated 3 years ago
- A tool for IDN homograph attacks and detection.☆731Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,725Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,902Updated last year
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆821Updated 3 years ago
- Capture handshakes of nearby WiFi networks automatically☆729Updated 3 years ago
- Mimikatz implementation in pure Python☆2,879Updated last month
- SSH-MITM - ssh audits made simple☆1,344Updated 2 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,356Updated 2 years ago
- Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux☆1,239Updated 3 months ago
- Network Analysis Tool☆3,026Updated last year
- Powerful framework for rogue access point attack.☆1,984Updated 10 months ago
- SensePost's modified hostapd for wifi attacks.☆548Updated 3 months ago
- PoC exploits for software vulnerabilities☆675Updated 3 years ago
- Connect like there is no firewall. Securely.☆1,535Updated last week
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆928Updated last year
- ☆1,317Updated 4 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,486Updated 10 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,014Updated last month
- Fancy reverse and bind shell handler☆2,647Updated 3 months ago
- This program show you IMSI numbers of cellphones around you.☆3,215Updated 4 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,261Updated last week