WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq
☆32Mar 21, 2015Updated 11 years ago
Alternatives and similar repositories for wpa-autopwn
Users that are interested in wpa-autopwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tools for working with the 802.11B scrambler when writing Packet-in-Packet exploits.☆20Sep 15, 2013Updated 12 years ago
- Attacking WPA/WPA encrypted access point without client.☆52Jan 7, 2014Updated 12 years ago
- Recursively searches a directory for any file containing a specified string☆48Jul 5, 2015Updated 10 years ago
- Wifi Automated Fake HotSpot Hijacking with aicrack-ng, airbase, ssl-strip, and dns spoof in Python.☆43Jun 6, 2014Updated 11 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- This is just a basic script that steals handshakes and cleans them this can then be used to crack them and steal wifi passwords, if you h…☆13May 21, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 11 years ago
- WiFi MITM Helper☆36Jul 28, 2022Updated 3 years ago
- Multi-mode wireless LAN Based on a Software Access point for Kali Linux.☆54Sep 22, 2018Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆14Dec 5, 2014Updated 11 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- 802.11 frame injection/reception tool for Linux mac80211 stack☆20Dec 30, 2014Updated 11 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 4 years ago
- This script will help help you to get the most of router in morocco by using pixiewps , reaver , aircrack-ng ,wifite☆11Sep 12, 2015Updated 10 years ago
- Read Magnetic stripe data using square card reader☆13Jul 12, 2013Updated 12 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆17Apr 4, 2015Updated 10 years ago
- ☆10May 30, 2015Updated 10 years ago
- keyfob rx☆25Mar 30, 2011Updated 15 years ago
- WPA/WPA2 Belkin.XXXX, Belkin_XXXXXX, belkin.xxx and belkin.xxxx router default key generator.☆15May 13, 2015Updated 10 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆18Oct 30, 2014Updated 11 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Sep 9, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Meteor package for client + server side IMSI-catcher detection.☆21Jun 9, 2016Updated 9 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- A quick and dirty utility to capture and store WiFi probes.☆18Dec 14, 2013Updated 12 years ago
- Logging clients with airodump-ng☆15Dec 13, 2013Updated 12 years ago
- Android 802.11 pentesting tool☆96May 3, 2014Updated 11 years ago