vanhoefm / krackattacks-scripts
β3,390Updated 2 months ago
Alternatives and similar repositories for krackattacks-scripts:
Users that are interested in krackattacks-scripts are comparing it to the libraries listed below
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3β3,115Updated 4 years ago
- β1,331Updated last year
- π‘ A python program to create a fake AP and sniff data.β1,669Updated 5 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercapβ2,500Updated 7 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pacβ¦β2,215Updated 3 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords arenβ¦β8,847Updated last year
- Sniffs sensitive data from interface or pcapβ1,735Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.β2,273Updated 5 months ago
- Automated Mass Exploiterβ5,084Updated last year
- Framework for Man-In-The-Middle attacksβ3,601Updated 6 years ago
- Exploitation Framework for Embedded Devicesβ12,395Updated last month
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's poβ¦β3,795Updated last year
- NSE script based on Vulners.com APIβ3,278Updated 11 months ago
- Continuously jam all wifi clients/routersβ4,063Updated 7 months ago
- Inject code and spy on wifi usersβ2,593Updated 3 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing β¦β579Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β4,617Updated 4 years ago
- A framework for wireless pentesting.β1,203Updated 4 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitMβ1,089Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)β4,063Updated last year
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.β1,094Updated 6 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Sβ¦β1,584Updated 4 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricksβ1,399Updated 6 years ago
- Empire is a PowerShell and Python post-exploitation agent.β7,558Updated 5 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.β3,662Updated 3 weeks ago
- WiFi arsenalβ1,973Updated 4 years ago
- wireless hacking - This is automated wireless hacking toolβ1,251Updated 2 years ago
- SSH man-in-the-middle toolβ1,647Updated 3 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.β4,017Updated 7 months ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.β2,110Updated last week