mirror of
https://github.com/byReqz/blackmate.git
synced 2024-11-01 03:33:13 +00:00
Create wireless
This commit is contained in:
parent
022db2f4a7
commit
a96e12d606
56
categories/wireless
Normal file
56
categories/wireless
Normal file
@ -0,0 +1,56 @@
|
||||
aircrack-ng|1.2rc4|Key cracker for the 802.11 WEP and WPA-PSK protocols|http://www.aircrack-ng.org
|
||||
airflood|0.1|A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.|http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html
|
||||
airoscript|45.0a122ee|A script to simplify the use of aircrack-ng tools.|http://midnightresearch.com/projects/wicrawl/
|
||||
airpwn|1.4|A tool for generic packet injection on an 802.11 network.|http://airpwn.sourceforge.net
|
||||
aphopper|0.3|AP Hopper is a program that automatically hops between access points of different wireless networks.|http://aphopper.sourceforge.net/
|
||||
apnbf|0.1|A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.|http://www.c0decafe.de/
|
||||
batctl|2016.0|B.A.T.M.A.N. advanced control and management tool.|http://www.open-mesh.net/
|
||||
batman-adv|2016.0|Batman kernel module, (included upstream since .38)|http://www.open-mesh.net/
|
||||
batman-alfred|2016.0|Almighty Lightweight Fact Remote Exchange Daemon|http://www.open-mesh.org/
|
||||
beholder|0.8.10|A wireless intrusion detection tool that looks for anomalies in a wifi environment.|http://www.beholderwireless.org/
|
||||
cowpatty|4.6|Wireless WPA/WPA2 PSK handshake cracking utility|http://www.wirelessdefence.org/Contents/Files/
|
||||
create_ap|206.a7fa8b5|This script creates a NATed or Bridged WiFi Access Point.|https://github.com/oblique/create_ap
|
||||
eapeak|95.6298946|Analysis Suite For EAP Enabled Wireless Networks.|https://github.com/securestate/eapeak
|
||||
freeradius|3.0.11|The premier open source RADIUS server|http://www.freeradius.org/
|
||||
fuzzap|14.f13932c|A python script for obfuscating wireless networks.|https://github.com/lostincynicism/FuzzAP
|
||||
g72x++|1|Decoder for the g72x++ codec.|http://www.ps-auxw.de/
|
||||
gerix-wifi-cracker|1.1c3cd73|A graphical user interface for aircrack-ng and pyrit.|https://github.com/TigerSecurity
|
||||
giskismet|20110805|A program to visually represent the Kismet data in a flexible manner.|http://www.giskismet.org
|
||||
gnuradio|3.7.9.2|General purpose DSP and SDR toolkit. With drivers for usrp and fcd.|http://gnuradio.org
|
||||
gqrx|2.5.3|Interactive SDR receiver waterfall for many devices.|http://gqrx.dk/
|
||||
hoover|4.9bda860|Wireless Probe Requests Sniffer.|https://github.com/xme/hoover/
|
||||
hostapd-wpe|2.2|IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator - Wireless Pwnage Edition.|https://github.com/OpenSecurityResearch/hostapd-wpe
|
||||
hotspotter|0.4|Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.|http://www.remote-exploit.org/?page_id=418
|
||||
jcrack|0.3.3beta|A utility to create dictionary files that will crack the default passwords of select wireless gateways|http://www.thedrahos.net/jcrack/
|
||||
kismet|2013_03_R1b|802.11 layer2 wireless network detector, sniffer, and intrusion detection system|http://www.kismetwireless.net/
|
||||
kismet-earth|0.1|Various scripts to convert kismet logs to kml file to be used in Google Earth.|https://www.blackarch.org/
|
||||
kismet2earth|1.0|A set of utilities that convert from Kismet logs to Google Earth .kml format|http://code.google.com/p/kismet2earth/
|
||||
lorcon|2.0.0.20091101|Generic library for injecting 802.11 frames|http://802.11ninja.net/
|
||||
mana|68.56bcfcd|A toolkit for rogue access point (evilAP) attacks first presented at Defcon 22.|https://github.com/sensepost/mana
|
||||
mdk3|v6|WLAN penetration tool|http://aspj.aircrack-ng.org/
|
||||
mfcuk|0.3.8|MIFARE Classic Universal toolKit|http://code.google.com/p/mfcuk/
|
||||
pixiewps|53.1448fff|An offline WPS bruteforce utility.|https://github.com/wiire/pixiewps
|
||||
reaver|1.4|Brute force attack against Wifi Protected Setup|http://code.google.com/p/reaver-wps/
|
||||
rfdump|1.6|A back-end GPL tool to directly inter-operate with any RFID ISO-Reader to make the contents stored on RFID tags accessible|http://www.rfdump.org
|
||||
rfidiot|73.91d9f16|An open source python library for exploring RFID devices.|http://rfidiot.org/
|
||||
rfidtool|0.01|A opensource tool to read / write rfid tags|http://www.bindshell.net/tools/rfidtool.html
|
||||
spectools|2010_04_R1|Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware. Stable version.|http://www.kismetwireless.net/spectools/
|
||||
timegen|0.4|This program generates a *.wav file to "send" an own time signal to DCF77 compatible devices.|http://bastianborn.de/radio-clock-hack/
|
||||
ubitack|0.3|Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go.|https://code.google.com/p/ubitack/
|
||||
waidps|16.ff8d270|Wireless Auditing, Intrusion Detection & Prevention System.|https://github.com/SYWorks/waidps
|
||||
wavemon|0.8.0|Ncurses-based monitoring application for wireless network devices|http://eden-feed.erg.abdn.ac.uk/wavemon/
|
||||
wepbuster|1.0_beta_0.7|script for automating aircrack-ng|http://code.google.com/p/wepbuster/
|
||||
wi-feye|1.1|An automated wireless penetration testing tool written in python, its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily.|http://wi-feye.za1d.com/download.php
|
||||
wifi-pumpkin|84.c8fa6fc|Framework for Rogue Wi-Fi Access Point Attack.|https://github.com/P0cL4bs/WiFi-Pumpkin
|
||||
wificurse|0.3.9|WiFi jamming tool.|https://github.com/oblique/wificurse
|
||||
wifijammer|66.abf7ea0|A python script to continuosly jam all wifi clients within range.|https://github.com/DanMcInerney/wifijammer
|
||||
wifiphisher|205.0bc2a82|Fast automated phishing attacks against WPA networks.|https://github.com/sophron/wifiphisher
|
||||
wifiscanmap|105.eb4488e|Another wifi mapping tool.|https://github.com/mehdilauters/wifiScanMap
|
||||
wifitap|2b16088|WiFi injection tool through tun/tap device.|https://github.com/GDSSecurity/wifitap
|
||||
wireless-ids|24.b132071|Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.|https://github.com/SYWorks/wireless-ids
|
||||
wirouter-keyrec|1.1.2|A powerful and platform independent software to recover the default WPA passphrases of the supported router models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley, Eircom Netopia, Pirelli TeleTu/Tele 2).|http://www.salvatorefresta.net/tools/
|
||||
wlan2eth|1.3|Re-writes 802.11 captures into standard Ethernet frames.|http://www.willhackforsushi.com/?page_id=79
|
||||
wpa-bruteforcer|4.d5f8586|Attacking WPA/WPA encrypted access point without client.|https://github.com/SYWorks/wpa-bruteforcer
|
||||
wpa2-halfhandshake-crack|27.6ed850f|A POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing the passphrase of the actual AP.|https://github.com/dxa4481/WPA2-HalfHandshake-Crack
|
||||
zizzania|115.a063e6c|Automated DeAuth attack.|https://github.com/cyrus-and/zizzania
|
||||
zykeys|0.1|Demonstrates how default wireless settings are derived on some models of ZyXEL routers.|http://packetstormsecurity.com/files/119156/Zykeys-Wireless-Tool.html
|
Loading…
Reference in New Issue
Block a user