Sunday, May 27, 2018
Home Tags Layer 2 vulnerability

Tag: layer 2 vulnerability

Yersinia

Must Need

peepdf

PEEPDF : A one stop tool for PDF Document forensic analysis Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks...
Fragroute

Fragroute – A Network Packet Fragmentation & Firewall Testing Tool

Fragroute intercepts,  modifies and rewrites egress traffic destined for the specified host. Simply frag route fragments packets originating from our(attacker) system to the destination...
Remove term: WiFi-Pumpkin WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is a complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In...
Sticky Keys Hack

WinPirate – Automated Sticky Keys Hack

We create a way to automate doing the window sticky keys hack from a bootable USB. Then, we automate getting as many saved passwords...
WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...
mdk3

mdk3

WiFi Stress testing using MDK3, Beacon Flooding & Deauthentication Attack. MDK3 is a proof of concept tool. It is used for stress testing 802.11 networks(wifi)....
metasploit

Metasploit Framework

Metasploit - "The de facto of Exploit Development", "The Attackers Playbook", "The one-stop Penetration Testing Solution" and it goes on.... Metasploit is a framework of...