Test WPA3 using virtual Wi-Fi interfaces
☆51Jul 16, 2022Updated 3 years ago
Alternatives and similar repositories for hostap-wpa3
Users that are interested in hostap-wpa3 are comparing it to the libraries listed below
Sorting:
- documents and specifications☆35Jun 29, 2018Updated 7 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- NVD semiupdated database to be used with CVEScannerV2☆17Mar 1, 2026Updated last week
- Implementation of rfc7664 dragonfly key exchange using ECC☆20Oct 12, 2018Updated 7 years ago
- Easy to install plug-in to allow configuration and wireless capture from a WLANPi directly within the Wireshark GUI☆11Mar 7, 2021Updated 5 years ago
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Vendor driver for RTW8852BU/RTW8832BU☆24Apr 11, 2024Updated last year
- windows-operating-system-archaeology @Enigma0x3 @subTee☆23Apr 22, 2017Updated 8 years ago
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- One BadUSB to rule them all using ATmega32U4☆22Nov 19, 2020Updated 5 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Updated this week
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- ☆29Dec 10, 2020Updated 5 years ago
- Mobile Pentesting Guide (WIP)☆25May 13, 2020Updated 5 years ago
- simple script to pwn android phone with physical access☆27Dec 22, 2018Updated 7 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63May 29, 2023Updated 2 years ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- ☆38Feb 26, 2025Updated last year
- ☆136Aug 4, 2022Updated 3 years ago
- ☆65Jan 12, 2022Updated 4 years ago
- ☆44Feb 6, 2025Updated last year
- ☆137Apr 24, 2019Updated 6 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- J5 2016 kernel☆10May 14, 2017Updated 8 years ago
- Checks for tpm vulnerabilities☆38Mar 16, 2023Updated 2 years ago
- Indirect NT syscalls LSASS dumper.☆47Jul 9, 2023Updated 2 years ago
- WIG (WiFi Information Gathering) is a free and open source utility for WiFi device fingerprinting.☆39Nov 28, 2022Updated 3 years ago
- Wraps github api for openly available information about an organization, user, or repo☆128May 22, 2023Updated 2 years ago
- Python bindings for hashcat☆33Jun 11, 2021Updated 4 years ago
- BypassCredGuard CS BOF☆51Jan 23, 2025Updated last year
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- ☆12Jan 31, 2020Updated 6 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- html5 port of earf (software terrain renderer)☆21Feb 21, 2014Updated 12 years ago
- Wireshark QMI dissector for Qualcomm based modems☆14Oct 2, 2025Updated 5 months ago