Monday, October 26, 2020

Wireless Attacks

Wireless Attacks main menu

Wireless Attacks

Home Wireless Attacks
Wireless Attacks main menu
Public WiFi

How Safe is to Use the Internet From Public WiFi?

The Internet has taken over our lives in such a powerful way that sometimes, we can't seem to thrive if...
reaver

Reaver + PixieWPS – Tool to Bruteforce the WPS of a WiFi Router

Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the...
mdk3

WiFi Stress Testing Using MDK3, Beacon Flooding & Deauthentication Attack.

MDK3 is a proof of concept tool. It is used for stress testing 802.11 networks(wifi). It consists of various methods...
bluelog

Bluelog

Simple Bluetooth Discovery with Bluelog Bluelog is a simple Bluetooth scanner that is designed to essentially do just one thing, log...

Must Need

PAKURI : Penetration Test Achieve Knowledge Unite Rapid Interface

PAKURI : Penetration Test Achieve Knowledge Unite Rapid Interface

Pakuri is a Penetration test Achieve Knowledge Unite Rapid Interface. Pentesters love to move their hands. However, I do not like troublesome...
Kaiten : A Undetectable Payload Generation

Kaiten : A Undetectable Payload Generation

A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual consent is...

Google makes it easy for AI developers to keep users’ data...

Recently, the tech giant Google has come with a new module for the TensorFlow which is its famous machine learning framework.  The new...
XSHOCK : Tool To Exploits ShellShock

XSHOCK : Tool To Exploits ShellShock

XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt.
AutoSource : Automated Source Code SonarQube

AutoSource : Automated Source Code SonarQube

AutoSource is an automated source code review framework integrated with SonarQube which is capable of performing static code analysis/reviews.
iCULeak : Tool To Find & Extract Credentials From Phone Configuration Files Hosted On CUCM

iCULeak : Tool To Find & Extract Credentials From Phone Configuration...

iCULeak (iCULeak.py) is a tool to find and extract credentials from phone configuration files in environments managed by Cisco's CUCM (Call...
Syborg : Recursive DNS Subdomain Enumerator With Dead-End Avoidance System

Syborg : Recursive DNS Subdomain Enumerator With Dead-End Avoidance System

Syborg is a recursive DNS subdomain enumerator with dead-end avoidance system (beta). It is a Recursive DNS Domain Enumerator...