Proof-of-concept of the KRACK attack against Linux and Android
☆158Mar 6, 2018Updated 8 years ago
Alternatives and similar repositories for krackattacks-poc-zerokey
Users that are interested in krackattacks-poc-zerokey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Krack POC☆126Apr 24, 2018Updated 8 years ago
- ☆3,498Dec 25, 2024Updated last year
- ☆142Apr 24, 2019Updated 7 years ago
- ☆66Jan 12, 2022Updated 4 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆142Oct 12, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆139Aug 4, 2022Updated 3 years ago
- Work in progress toolkit for KRACK attack.☆70Mar 26, 2019Updated 7 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- This code has base on a code made by Mathy Vanhoef (https://github.com/vanhoefm/krackattacks-poc-zerokey). Please, take a look on README.…☆53Jul 3, 2018Updated 7 years ago
- ☆31Dec 10, 2020Updated 5 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- Modified drivers to reliably perform fragmentation and aggregation vulnerability tests☆12Jan 7, 2023Updated 3 years ago
- ☆77Apr 23, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- ☆1,287Apr 29, 2025Updated last year
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- Fork of the kernel backports repository☆12Aug 5, 2025Updated 9 months ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,481Sep 22, 2024Updated last year
- Evil client portion of EAP relay attack☆217Jul 5, 2023Updated 2 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆70Mar 11, 2018Updated 8 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 9 years ago
- OpenRISC 1000 processor module for IDA 7.x☆13Feb 13, 2024Updated 2 years ago
- Converting ArchLinux ARM OS for Berryboot☆15Sep 26, 2023Updated 2 years ago
- ViewState Payload Generator☆26Aug 17, 2018Updated 7 years ago
- A tool to exploit .NET Remoting Services☆535Jul 31, 2024Updated last year
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago