vanhoefm / krackattacks-poc-zerokey
Proof-of-concept of the KRACK attack against Linux and Android
☆152Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for krackattacks-poc-zerokey
- Krack POC☆122Updated 6 years ago
- ☆109Updated 2 years ago
- ☆61Updated 2 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆286Updated 3 weeks ago
- ☆121Updated 5 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆227Updated 2 months ago
- ☆213Updated 5 months ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆243Updated 10 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Updated 7 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆148Updated 7 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆107Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆352Updated last month
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆83Updated 3 years ago
- Evil client portion of EAP relay attack☆191Updated last year
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆250Updated 6 years ago
- Car Backdoor Maker☆215Updated 6 years ago
- NTP Main-in-the-Middle tool☆227Updated 2 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆139Updated 6 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 4 years ago
- WIreless Hacking Tools☆161Updated 11 years ago
- This code has base on a code made by Mathy Vanhoef (https://github.com/vanhoefm/krackattacks-poc-zerokey). Please, take a look on README.…☆48Updated 6 years ago
- GSM Assessment Toolkit - A security evaluation framework for GSM networks☆73Updated 6 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆444Updated 5 years ago
- Script to generate malicious debian packages (debain trojans).☆117Updated 5 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆279Updated last year
- myBFF - a Brute Force Framework☆138Updated 11 months ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago