vanhoefm / hostap-wpa3View external linksLinks
Test WPA3 using virtual Wi-Fi interfaces
☆51Jul 16, 2022Updated 3 years ago
Alternatives and similar repositories for hostap-wpa3
Users that are interested in hostap-wpa3 are comparing it to the libraries listed below
Sorting:
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- NVD semiupdated database to be used with CVEScannerV2☆17Feb 1, 2026Updated last week
- sigma_dut - WFA Sigma DUT/CA☆37Jan 30, 2026Updated 2 weeks ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- This version touches disk for registry persistence.☆26Oct 6, 2015Updated 10 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 10 months ago
- Vendor driver for RTW8852BU/RTW8832BU☆23Apr 11, 2024Updated last year
- ☆45Jan 11, 2026Updated last month
- One BadUSB to rule them all using ATmega32U4☆22Nov 19, 2020Updated 5 years ago
- Recon scripts for Red Team and Web blackbox auditing☆26Dec 29, 2025Updated last month
- Scripts to enable Wireshark to be run on various laptop types using the WLANPi as a remote packet sniffer☆19Aug 29, 2019Updated 6 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 10 months ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- Mobile Pentesting Guide (WIP)☆25May 13, 2020Updated 5 years ago
- ☆29Dec 10, 2020Updated 5 years ago
- simple script to pwn android phone with physical access☆27Dec 22, 2018Updated 7 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63May 29, 2023Updated 2 years ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated 11 months ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- A composite action that loads and applies hashicorp vault secrets as kubernetes secret and configmap resources☆18Oct 31, 2024Updated last year
- ☆38Feb 26, 2025Updated 11 months ago
- ☆63Jan 12, 2022Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. RE…☆13May 17, 2014Updated 11 years ago
- J5 2016 kernel☆10May 14, 2017Updated 8 years ago
- Checks for tpm vulnerabilities☆38Mar 16, 2023Updated 2 years ago
- Indirect NT syscalls LSASS dumper.☆46Jul 9, 2023Updated 2 years ago
- mac80211 driver for MediaTek MT76x2 802.11ac chips☆31Dec 21, 2025Updated last month
- gui tool to create normal payload by msfvenom☆34Dec 26, 2018Updated 7 years ago
- WIG (WiFi Information Gathering) is a free and open source utility for WiFi device fingerprinting.☆39Nov 28, 2022Updated 3 years ago
- Python bindings for hashcat☆33Jun 11, 2021Updated 4 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated last year
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- ☆12Feb 1, 2026Updated last week
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- ☆12Jan 31, 2020Updated 6 years ago
- Nonblocking data structures☆12Jan 25, 2015Updated 11 years ago