vanhoefm / krackattacks-poc-zerokeyLinks
Proof-of-concept of the KRACK attack against Linux and Android
☆156Updated 7 years ago
Alternatives and similar repositories for krackattacks-poc-zerokey
Users that are interested in krackattacks-poc-zerokey are comparing it to the libraries listed below
Sorting:
- Krack POC☆125Updated 7 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆295Updated last year
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆221Updated 5 years ago
- ☆134Updated 6 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆177Updated 9 years ago
- ☆242Updated last year
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Updated 7 years ago
- ☆62Updated 4 years ago
- ☆128Updated 3 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆159Updated 8 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- WIreless Hacking Tools☆168Updated 12 years ago
- NTP Main-in-the-Middle tool☆248Updated 3 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆277Updated 2 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆159Updated 5 years ago
- Car Backdoor Maker☆220Updated 7 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Updated 11 months ago
- ☆153Updated 2 years ago
- Script to generate malicious debian packages (debain trojans).☆120Updated 6 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆361Updated 4 months ago
- Fetch, install and search exploit archives from exploit sites.☆117Updated 2 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆117Updated 7 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆102Updated 2 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 8 years ago
- Python plugin for Kismet to perform deauthentication to collect WPA2 handshakes☆100Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆164Updated 6 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Updated 6 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆183Updated 7 years ago
- Just random files I've stored here for people to get access to because wordpress doesn't like python.☆83Updated 3 years ago