Esta herramienta de terminal, nos permite realizar 3 tipos de ataque contra puntos de acceso (WPA y WPA2 PSK). De-autenticación attack, HANDSHAKE attack y PMKID attack.
-
Updated
May 25, 2022 - Shell
Handshake is a decentralized, permissionless naming protocol where every peer is validating and in charge of managing the root DNS naming zone with the goal of creating an alternative to existing Certificate Authorities and naming systems. Names on the internet (top level domains, social networking handles, etc.) ultimately rely upon centralized actors with full control over a system which are relied upon to be honest, as they are vulnerable to hacking, censorship, and corruption. Handshake aims to experiment with new ways the internet can be more secure, resilient, and socially useful with a peer-to-peer system validated by the network’s participants.
Esta herramienta de terminal, nos permite realizar 3 tipos de ataque contra puntos de acceso (WPA y WPA2 PSK). De-autenticación attack, HANDSHAKE attack y PMKID attack.
Checks for Sendmail TLS handshake fails and e-mails the domains that failed them
A secure connection between client and server using the TLS1.2 protocol.
P2P bitcoin node showcase demonstrating a node handshake
A stop-and-wait reliable data transfer FTP client based on UDP.
👯 Collaborative Transactional Validation framework.
AppImage builds for https://github.com/kyokan/bob-wallet
Ethereum peer-to-peer handshake procedure
Miguel Gargallo HNS code
Simple utility to generate a websocket handshake hash/response.
Sample implementation of SCTP (RFC4960) Handshake using C socket Programming
Released 2018