vanhoefm / krackattacks-poc-zerokey
Proof-of-concept of the KRACK attack against Linux and Android
☆154Updated 7 years ago
Alternatives and similar repositories for krackattacks-poc-zerokey:
Users that are interested in krackattacks-poc-zerokey are comparing it to the libraries listed below
- Krack POC☆124Updated 6 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆111Updated 6 years ago
- ☆124Updated 5 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆287Updated 4 months ago
- ☆63Updated 3 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆140Updated 6 years ago
- WIreless Hacking Tools☆162Updated 11 years ago
- ☆220Updated 9 months ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 5 months ago
- ☆116Updated 2 years ago
- Car Backdoor Maker☆218Updated 6 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆594Updated 3 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 5 years ago
- myBFF - a Brute Force Framework☆140Updated 3 weeks ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆142Updated 8 years ago
- My collection of metasploit auxiliary post-modules☆190Updated 5 years ago
- NTP Main-in-the-Middle tool☆244Updated 2 years ago
- Linux Memory Cryptographic Keys Extractor☆237Updated last year
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆252Updated 6 years ago
- SSLStrip version to defeat HSTS☆316Updated 7 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 6 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆465Updated 7 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 8 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆238Updated last month
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- Tools for 802.11 information gathering.☆119Updated 2 years ago