eaphammer
Network Exploiter
A toolkit for exploiting weaknesses in WPA2-Enterprise networks to gain unauthorized access to credentials
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
2k stars
78 watching
313 forks
Language: C
last commit: 5 months ago Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of exploits and auxiliary modules for WordPress vulnerability exploitation using Metasploit | 218 |
| An exploitation project demonstrating how to chain vulnerabilities in Safari to escalate privilege on macOS | 404 |
| An attack surface management platform that automates the discovery of hidden assets and vulnerabilities in computer environments. | 8,190 |
| A Python-based framework for conducting man-in-the-middle attacks and rogue access point exploits on wireless networks. | 2,016 |
| A tool to exploit vulnerabilities in the sudo program on Unix-like systems | 2,258 |
| A toolkit designed to test and exploit Cross-Site Request Forgery vulnerabilities in websites. | 1,116 |
| A tool allowing visibility into network traffic by intercepting and displaying HTTP/1, HTTP/2, and WebSocket requests and responses. | 416 |
| Bypasses SSL certificate pinning to allow intercepting encrypted traffic from many applications on Android devices. | 710 |
| An exploit tool for Huawei DG8045 and HG633 devices, allowing penetration testing and password cracking. | 26 |
| A collection of algorithms and tools for cracking WPA/WPS security protocols | 404 |
| A tool designed to bypass antivirus software and evade detection. | 691 |
| A collection of Cobaltstrike PowerShell plugins designed to simplify exploitation and penetration testing | 404 |
| A tool designed to manipulate and abuse Windows access tokens for exploitation and learning purposes. | 269 |
| An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. | 25 |
| A tool designed to exploit DNS rebinding vulnerabilities in web applications, allowing it to bypass security restrictions and exfiltrate sensitive data | 486 |