Thursday, February 27, 2020

Wireless Attacks

Wireless Attacks main menu

Wireless Attacks

Home Wireless Attacks
Wireless Attacks main menu

No posts to display

Must Need

Tips for Recovering the data easily

Recovering data has been mysterious job for a long time once users lost data and then have to ask some experts to do...
Youzer : Fake User Generator For Active Directory Environments

Youzer : Fake User Generator For Active Directory Environments

Fake User Generator for Active Directory Environments. The goal of Youzer is to create information rich Active Directory environments. This uses the python3...
Aircrack-NG

Aircrack-NG : Complete Suite Tools To Assess WiFi Network Security

Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and...
Diaphora : Most Advanced Free & Open Source Program Diffing Tool

Diaphora : Most Advanced Free & Open Source Program Diffing Tool

Diaphora (διαφορά, Greek for 'difference') version 1.2.4 is a program diffing plugin for IDA, similar to Zynamics Bindiff or other FOSS...
Security RAT : Tool For Handling Security Requirements In Development

Security RAT : Tool For Handling Security Requirements In Development

OWASP Security RAT (Requirement Automation Tool) is a tool supposed to assist with the problem of addressing security requirements during application development. The...
FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible...
Applepie : A Hypervisor For Fuzzing Built With WHVP & Bochs

Applepie : A Hypervisor For Fuzzing Built With WHVP & Bochs

Hello! Welcome to applepie! This is a tool designed for fuzzing, introspection, and finding bugs! This is a hypervisor using the Windows...