PMKID Attack Automator
Tool for PMKID attack against WPA2-PSK without needing to capture a full handshake. Clientless attack.
Professional offensive security tools & exploit frameworks
Tool for PMKID attack against WPA2-PSK without needing to capture a full handshake. Clientless attack.
Tool for testing downgrade vulnerabilities in WPA3 networks (Dragonblood attacks). Forces fallback to WPA2 for credential capture.
RF signal analyzer using RTL-SDR: spectrum scanning, signal demodulation, replay attacks on 433MHz/915MHz devices.
Documented collection of Wi-Fi deauthentication techniques and countermeasures. Includes 802.11w analysis and PMF bypass.
Plugin for Kismet that maps wireless infrastructure: APs, clients, probes, with exportable network graphs.
Tool for attacking WPA2/3-Enterprise (EAP): rogue RADIUS server, certificate impersonation, and credential harvesting.
C source code for shellcode injection via process hollowing. Creates a suspended process, unmaps the original section, and injects the payload.
DLL template with integrated reflective loader. Loads into memory without touching disk or using LoadLibrary().
Core Remote Access Trojan module in Python. Encrypted communication, command execution, file transfer, and basic persistence.
Shellcode encoder with 8 encoding schemes: XOR rolling, AES stub, RC4, SUB/ADD chain, insertion, shikata-ga-nai style.
Windows kernel driver (KMDF) with process, file, and network connection hiding capabilities. Includes usermode loader.
Standalone keylogger module using SetWindowsHookEx. Captures keystrokes, identifies active window, saves to encrypted log.