MacStealer: Wi-Fi Client Isolation Bypass
☆541Dec 17, 2025Updated 3 months ago
Alternatives and similar repositories for macstealer
Users that are interested in macstealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Jun 23, 2023Updated 2 years ago
- Common python and scapy scripts for Wi-Fi☆66Dec 22, 2025Updated 3 months ago
- Wi-Fi MFP Deauthentication: proof-of-concepts, security patches, and more.☆33Apr 15, 2023Updated 2 years ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆252Apr 18, 2025Updated 11 months ago
- An Open-source LTE Downlink/Uplink Eavesdropper☆2,142Oct 23, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A WPA3 dictionary cracker☆351Jul 10, 2023Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆397Aug 2, 2023Updated 2 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆169Nov 26, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆898Mar 11, 2026Updated 2 weeks ago
- A full-featured open-source Wi-Fi fuzzer☆199Sep 30, 2025Updated 5 months ago
- DJI Drone Control Hijacking☆44Sep 13, 2023Updated 2 years ago
- ☆569Mar 28, 2024Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,117Jun 10, 2024Updated last year
- ☆163Sep 26, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆524Dec 17, 2025Updated 3 months ago
- it is very good☆515Dec 20, 2022Updated 3 years ago
- All kinds of tiny shells☆65Feb 3, 2023Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- tool for identifying guest relationships between companies☆103Jun 27, 2024Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,473Sep 22, 2024Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,209Jan 5, 2026Updated 2 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,111Jun 19, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,273Dec 9, 2025Updated 3 months ago
- SensePost's modified hostapd for wifi attacks.☆603Aug 5, 2024Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,260Mar 19, 2025Updated last year
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Aug 15, 2025Updated 7 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- ☆70Jul 6, 2023Updated 2 years ago
- evilginx3 + gophish☆1,970Jun 15, 2024Updated last year
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,374Oct 27, 2023Updated 2 years ago
- A tool that bypasses PN553 signature protection☆50Aug 16, 2023Updated 2 years ago
- Lifetime AMSI bypass☆672Sep 26, 2023Updated 2 years ago
- scan for NTLM directories☆381Aug 13, 2025Updated 7 months ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆267Mar 1, 2024Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,013Jan 7, 2026Updated 2 months ago
- RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact☆1,762Jul 27, 2025Updated 7 months ago