Wednesday, March 20, 2019

Wireless Attacks

Wireless Attacks main menu

Wireless Attacks

Home Wireless Attacks
Wireless Attacks main menu

No posts to display

Must Need

Noisy

Noisy – Simple random DNS, HTTP/S Internet Traffic Noise Generator

Noisy is a simple python script that generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to...
ADAPT

ADAPT : Tool That Performs Automated Penetration Testing for WebApps

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy, speed,...
RPI Hunter

RPI-Hunter : Automate Discovering & Dropping Payloads on LAN Raspberry

rpi hunter is useful when there are multiple Raspberry Pi's on your LAN with default or known credentials, in order to automate...
WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is an extremely total system for evaluating Wi-Fi security. The fundamental feature is the capacity to make a phony AP and make Man...
Crackle

Crackle – Crack Bluetooth Smart Encryption

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force...
VSHG

VSHG : A Standalone Addon for GnuPG

VSHG aims to provide a memory / hardware resistant reinforcement to GnuPG's standared s2k key-derivation-function + a simplified interface for symmetric encryption...
Concrete5 CMS

Vulnerability Scanner And Information Gatherer For The Concrete5 CMS – C5Scan

Vulnerability scanner and data gatherer for the Concrete5 CMS or C5Scan. Is somewhat outdated by and by pending a refactor. Concrete5 is an open-source content...