In multiple functions that process 802.11 frames, out-of-bounds reads can occur due to insufficient validation.
#WORDLIST

Weakpass collection of tools for bruteforce and hashcracking.

The security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.