Hcxdumptool is small tool to capture packets from wlan devices. After capturing, upload the “uncleaned” cap here to see if your application or the client is vulnerable by using common wordlists. Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools) and check if wlan-key or plainmasterkey was transmitted unencrypted.
Stand-alone binary – designed to run on Raspberry Pi’s with installed Arch Linux. It should work on other Linux systems (notebooks, desktops) and distributions, too.
Also Read Whatsapp_Automation : Collection Of APIs Interact With WhatsApp Running In An Android Emulator
Tool | Description |
---|---|
hcxdumptool | Tool to run several tests to determine if access points or clients are vulnerable |
pioff | Turns Raspberry Pi off via GPIO switch |
Simply run:
make
make install (as super user)
or (with GPIO support – hardware mods required)
make GPIOSUPPORT=on
make GPIOSUPPORT=on install (as super user)
You need:
--recursive
flag in git clone
or git submodules update
command run)ndk-build
– built executable for some architectures should be created inside libs
directory. Copy it to your phone and enjoy.USB ID 0bda:8189 Realtek Semiconductor Corp. RTL8187B Wireless 802.11g 54Mbps Network Adapter
Script | Description |
---|---|
bash_profile | Autostart for Raspberry Pi (copy to /root/.bash_profile) |
pireadcard | Back up a Pi SD card |
piwritecard | Restore a Pi SD card |
makemonnb | Example script to activate monitor mode |
killmonnb | Example script to deactivate monitor mode |
You must use hcxdumptool only on networks you have permission to do this, because
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…