vanhoefm / krackattacks
☆1,331Updated last year
Alternatives and similar repositories for krackattacks:
Users that are interested in krackattacks are comparing it to the libraries listed below
- ☆3,383Updated last month
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆751Updated 6 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 6 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,666Updated 5 years ago
- A framework for wireless pentesting.☆1,203Updated 4 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆578Updated 7 years ago
- Automated wanadecrypt with key recovery if lucky☆788Updated 7 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,214Updated 3 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,091Updated 6 years ago
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- SSH man-in-the-middle tool☆1,644Updated 3 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆579Updated 2 years ago
- WarBerryPi - Tactical Exploitation☆2,224Updated 5 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,501Updated 6 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,115Updated 4 years ago
- ☆351Updated 3 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,025Updated 5 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,847Updated 2 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆764Updated 4 years ago
- Wannacry in-memory key recovery☆1,079Updated 7 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 7 years ago
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆520Updated 2 years ago
- NSA finest tool☆974Updated 7 years ago
- Various PoCs☆490Updated 5 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆908Updated 7 years ago
- This repository contains some bettercap transparent proxy example modules.☆282Updated 6 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆537Updated 2 years ago
- GoCrack is a management frontend for password cracking tools written in Go☆1,228Updated 2 months ago
- Salamandra is a tool to find spy microphones that use radio freq to transmit. It uses SDR.☆825Updated 4 years ago