MacStealer: Wi-Fi Client Isolation Bypass
☆533Dec 17, 2025Updated 2 months ago
Alternatives and similar repositories for macstealer
Users that are interested in macstealer are comparing it to the libraries listed below
Sorting:
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆251Apr 18, 2025Updated 10 months ago
- Common python and scapy scripts for Wi-Fi☆66Dec 22, 2025Updated 2 months ago
- An Open-source LTE Downlink/Uplink Eavesdropper☆2,136Oct 23, 2024Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Nov 9, 2022Updated 3 years ago
- A WPA3 dictionary cracker☆350Jul 10, 2023Updated 2 years ago
- DJI Drone Control Hijacking☆41Sep 13, 2023Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,100Jun 10, 2024Updated last year
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆168Nov 26, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Feb 18, 2026Updated 2 weeks ago
- ☆568Mar 28, 2024Updated last year
- it is very good☆515Dec 20, 2022Updated 3 years ago
- A full-featured open-source Wi-Fi fuzzer☆197Sep 30, 2025Updated 5 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,263Mar 19, 2025Updated 11 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,757Jul 27, 2025Updated 7 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆398Aug 15, 2025Updated 6 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,263Dec 9, 2025Updated 2 months ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,106Jun 19, 2024Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,188Jan 5, 2026Updated 2 months ago
- Analyse your malware to surgically obfuscate it☆520Dec 17, 2025Updated 2 months ago
- ☆163Sep 26, 2023Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,466Sep 22, 2024Updated last year
- evilginx3 + gophish☆1,962Jun 15, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- Lifetime AMSI bypass☆672Sep 26, 2023Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 3 years ago
- All kinds of tiny shells☆65Feb 3, 2023Updated 3 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,011Jan 7, 2026Updated last month
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,369Oct 22, 2025Updated 4 months ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers