MAC Filtering Bypass

MAC Filtering Bypass
Download Copy
Title: MAC Filtering Bypass
Author: TW-D

This payload allows bypassing MAC filtering, which is a security method used to control access to a network based on the MAC address of devices. This payload requires a Shark Jack Cable

🏆   Recognized with a Payload Award in October 2025

 

This payload is for the Shark Jack — a portable network attack tool. It's a pentesters best friend, optimized for social engineering engagements and opportunistic wired network auditing. Jack into a network an instantly run advanced sysadmin and pentest payloads.

Submit your own payload, or browse more featured Shark Jack Payloads.

 

 

Related Payloads

PlunderPIN
PlunderPIN
PlunderPIN is a mobile PIN phishing payload that replaces a user's Google Chrome browser homepage with a malicious imita
Read More
capture http credentials
capture http credentials
This payload uses inotifywait and DYNAMICPROXY to monitor the HTTP POST data streams generated by a client and extract s
Read More
Strip Connected Clients
Strip Connected Clients
Pulls previously connected clients from the recon database and stores that list in a file located in /root/loot/info.
Read More