vanhoefm / krackattacks-poc-zerokey
Proof-of-concept of the KRACK attack against Linux and Android
☆153Updated 6 years ago
Alternatives and similar repositories for krackattacks-poc-zerokey:
Users that are interested in krackattacks-poc-zerokey are comparing it to the libraries listed below
- Krack POC☆124Updated 6 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆288Updated 3 months ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆110Updated 6 years ago
- ☆114Updated 2 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 4 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆237Updated 2 weeks ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 3 years ago
- ☆219Updated 8 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 4 months ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 7 years ago
- WIreless Hacking Tools☆162Updated 11 years ago
- Evil client portion of EAP relay attack☆196Updated last year
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆251Updated 6 years ago
- ☆150Updated last year
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆593Updated 3 years ago
- List of Awesome Offensive Tools written in GO☆199Updated 5 years ago
- ☆123Updated 5 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- myBFF - a Brute Force Framework☆139Updated last year
- A mirror of the original SSLstrip+ code by Leonardo Nve☆179Updated 6 years ago
- SensePost's modified hostapd for wifi attacks.☆560Updated 6 months ago
- ☆63Updated 3 years ago
- Modified hostapd to facilitate AP impersonation attacks☆502Updated 6 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆168Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆93Updated 8 years ago
- Fetch, install and search exploit archives from exploit sites.☆111Updated last year