Proof-of-concept of the KRACK attack against Linux and Android
☆158Mar 6, 2018Updated 8 years ago
Alternatives and similar repositories for krackattacks-poc-zerokey
Users that are interested in krackattacks-poc-zerokey are comparing it to the libraries listed below
Sorting:
- Krack POC☆126Apr 24, 2018Updated 7 years ago
- ☆3,492Dec 25, 2024Updated last year
- ☆137Apr 24, 2019Updated 6 years ago
- ☆136Aug 4, 2022Updated 3 years ago
- ☆65Jan 12, 2022Updated 4 years ago
- This code has base on a code made by Mathy Vanhoef (https://github.com/vanhoefm/krackattacks-poc-zerokey). Please, take a look on README.…☆53Jul 3, 2018Updated 7 years ago
- Work in progress toolkit for KRACK attack.☆70Mar 26, 2019Updated 6 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆143Oct 12, 2018Updated 7 years ago
- ViewState Payload Generator☆26Aug 17, 2018Updated 7 years ago
- ☆29Dec 10, 2020Updated 5 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Feb 28, 2017Updated 9 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Mar 11, 2018Updated 7 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- ☆76Feb 5, 2019Updated 7 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆322Feb 7, 2018Updated 8 years ago
- ☆86Mar 29, 2018Updated 7 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- ☆1,285Apr 29, 2025Updated 10 months ago
- Alphanumeric+1 shellcoding tools for RISC-V☆37Aug 12, 2019Updated 6 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆757Mar 23, 2018Updated 7 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆65Jun 5, 2018Updated 7 years ago
- Bluetooth Find provides a mechanism with which you can locate and track discoverable Bluetooth devices☆30Dec 17, 2018Updated 7 years ago
- ☆25Jul 5, 2018Updated 7 years ago