what you don't know can hurt you
Showing 1 - 25 of 288 RSS Feed

Wireless Files

Aircrack-ng Wireless Network Tools 1.2 RC4
Posted Feb 16, 2016
Site aircrack-ng.org

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Changes: Various improvements and bug fixes including improved chipset detection on FreeBSD for Airmon-ng, compilation fixes, and more.
tags | tool, wireless
systems | unix
MD5 | 3bbc7d5035a98ec01e78774d05c3fcce
Aircrack-ng Wireless Network Tools 1.2 RC3
Posted Nov 22, 2015
Site aircrack-ng.org

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Changes: Various improvements and bug fixes.
tags | tool, wireless
systems | unix
MD5 | 3f4096808c916baa8872a5ad138a9c35
TRENDnet TEW-818RDU PIN Disclosure
Posted Jun 28, 2015
Authored by kcdtv

TRENDnet TEW-818RDU versions 1 ("ac1900") and 2 ("ac3200") PIN disclosure exploit.

tags | tool, wireless
MD5 | 5b805f68629f8e3a74b71dcd8b31c58e
DAWIN - Distributed Audit and Wireless Intrustion Notification 2.0
Posted Apr 28, 2015
Authored by Mark Osborne | Site loud-fat-bloke.co.uk

DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual.

Changes: Bug fixes.
tags | tool, wireless
systems | unix
MD5 | 4f51e2e8b3f990e1704e4d30a881a3b5
Aircrack-ng Wireless Network Tools 1.2 RC2
Posted Apr 10, 2015
Site aircrack-ng.org

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Changes: Various improvements and bug fixes.
tags | tool, wireless
systems | unix
MD5 | ebe9d537f06f4d6956213af09c4476da
WifiPhisher Phishing Tool
Posted Jan 4, 2015
Authored by sophron | Site github.com

Wifiphisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining WPA credentials.

tags | tool, wireless
MD5 | fed294fe825f8218e102d3226a3ced60
DAWIN - Distributed Audit and Wireless Intrustion Notification
Posted Sep 17, 2014
Authored by Mark Osborne | Site loud-fat-bloke.co.uk

DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual.

tags | tool, wireless
systems | linux
MD5 | 0511fe8004506146c94cef634534f905
Aircrack-ng Wireless Network Tools 1.2 Beta 3
Posted Apr 1, 2014
Site aircrack-ng.org

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Changes: A buffer overflow was finally fixed for good. An issue with invalid channels when scanning (108, 125, etc.) that was due to radiotap parsing was fixed. The radiotap parser was updated to the latest git version. There were other small fixes.
tags | tool, wireless
systems | unix
MD5 | ec5492e65ce7e98c6812e84b1d18d811
Pytacle Alpha2
Posted Dec 5, 2013
Authored by Daniel Mende

pytacle is a tool inspired by tentacle. It automates the task of sniffing GSM frames of the air, extracting the key exchange, feeding kraken with the key material and finally decode/decrypt the voice data. All You need is a USRP (or similar) to capture the GSM band and a kraken instance with the berlin tables (only about 2TB).

Changes: Support of RTLSDR sticks, possibility to scan for cells around you, and more.
tags | tool, wireless
systems | unix
MD5 | 5468c3e07706a551b3141dbab8b002e3
SkyJack Drone Hijacker
Posted Dec 4, 2013
Authored by Samy | Site samy.pl

Skyjack takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control.

tags | tool, wireless
MD5 | 60f6360d11e695f197bc42e97bbd6006
Bluelog Bluetooth Scanner/Logger 1.1.2
Posted Nov 4, 2013
Authored by Tom Nardi | Site digifail.com

Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.

Changes: This minor release primarily dealt with visual and functional improvements to Bluelog Live mode. Bluelog Live now has a new default theme, as well as a novelty theme for fun, and there is improved support for more complex themes. README.LIVE was updated with more information. There was also documentation improvement and pruning across the board, a new target for the Pwnie Express Pwn Pad, and a fix for a critical bug with the obfuscate (-x) function.
tags | tool, web, wireless
systems | unix
MD5 | 614d0fe65bae68acff1d33d9f86e4805
HWK Wireless Auditing Tool 0.4
Posted Oct 18, 2013
Authored by atzeton | Site nullsecurity.net

hwk is an easy-to-use wireless authentication and de-authentication tool. Furthermore, it also supports probe response fuzzing, beacon injection flooding, antenna alignment and various injection testing modes. Information gathering is selected by default and shows the incoming traffic indicating the packet types.

Changes: Various binaries replaced. Introduced setcap capabilities.
tags | tool, wireless
systems | unix
MD5 | e6966ea245e44d2ba33e57da24e1c00c
ARRIS DG860A WPS PIN Generator
Posted Oct 15, 2013
Authored by Justin Oberdorf

This is a ruby script that will generate the default WPS PIN for the Arris DG860A providing you know the HFC MAC address.

tags | tool, wireless, ruby
MD5 | 8322b2f4a5cb516665858f772a46b780
Wi-fEye Wireless Pentesting Tool 1.0 Beta
Posted Aug 26, 2013
Authored by Zaid Al-Quraishi | Site wi-feye.za1d.com

Wi-fEye is designed to help with network penetration testing. It allows the user to perform a number of powerful attack automatically including WEP/WPA cracking, session hijacking and more.

Changes: Various updates.
tags | tool, wireless
systems | unix
MD5 | efe439aba781823ba11fd3d5fde7e4b2
Wireless Decoder 1.0
Posted Apr 19, 2013
Authored by Kevin Devine

Wireless Decoder is an application that demonstrates how to recover wireless passwords on Vista/Win7/Win8. Comes with source and the binary.

tags | tool, wireless
MD5 | d8d2386e1320ff3298bd2aa3d5f844ab
Bluelog Bluetooth Scanner/Logger 1.1.1
Posted Apr 1, 2013
Authored by Tom Nardi | Site digifail.com

Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.

Changes: This release features improved memory management, the ability to log device manufacturers to a file, and the option to encode detected MAC addresses with CRC32.
tags | tool, web, wireless
systems | unix
MD5 | 5a8bb5f397f9bbc224d1d37bf5a8ab6b
ChronIC RF Hacking Tool
Posted Mar 12, 2013
Authored by Adam Laurie

ChronIC is the Chronos Integrated Commander, a wearable Sub-GHz RF hacking tool. Written in python.

tags | tool, python, wireless
MD5 | 1a579d76ba3e98006daa14b5fbcaffcf
Bluefog 0.0.4
Posted Feb 12, 2013
Authored by Tom Nardi | Site digifail.com

Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.

Changes: Improvements to random MAC generation. A "Loiter" mode has been added.
tags | tool, wireless
systems | unix
MD5 | 23937d1bf1818cf338e6b55f7ea32dd5
Net-War Reaver Wrapper
Posted Feb 12, 2013
Authored by Sven Wurth

This tool is a wrapper for the reaver WPS attack toolkit. As there is no automatic way to prescan, decide, and then start the attack, this wrapper takes care of it. Written in perl.

tags | tool, perl, wireless
MD5 | 676243dd31616cf6b9d17f62b1242e44
Bluefog 0.0.3
Posted Jan 15, 2013
Authored by Tom Nardi | Site digifail.com

Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.

Changes: Many internal fixes and early work on a proper signal handler. Threads should now (probably) shut down cleanly.
tags | tool, wireless
systems | unix
MD5 | 5bf11b84221f6ab483802a203e9403f9
Zykeys Wireless Tool
Posted Dec 30, 2012
Authored by Kevin Devine

Zykeys demonstrates how default wireless settings are derived on some models of ZyXEL routers.

tags | tool, wireless
systems | unix
MD5 | b09d6573369303a6fe62faa8ab3b7bea
Bluelog Bluetooth Scanner/Logger 1.1.0
Posted Dec 29, 2012
Authored by Tom Nardi | Site digifail.com

Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.

Changes: This is a stable release intended for general use. It adds many internal improvements, cleanups, and bugfixes, and is a suggested upgrade for all users.
tags | tool, web, wireless
systems | unix
MD5 | a5327d64731cd45debb57ab1edbe6e43
Bluefog 0.0.2
Posted Dec 22, 2012
Authored by Tom Nardi | Site digifail.com

Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.

Changes: This release is in the very early stages of development and there are some areas of the software which need attention and improvement. There is currently very little in the way of error checking.
tags | tool, wireless
systems | unix
MD5 | 4ff79348d3e5eb01bc5ee1b438bb5a90
RFIDIOt Python Library For RFID Readers 1.0d
Posted Oct 4, 2012
Authored by Adam Laurie | Site rfidiot.org

RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r).

Changes: Detection of more ACS readers and a bug fix.
tags | tool, python, wireless
systems | linux
MD5 | 50b16c74623545409e68ef7230fe0493
Cura 1.4
Posted Jul 13, 2012
Site github.com

Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs directly from a server, a SysMonitor module that visually graphs CPU and RAM usage percentages, access to Nmap, and Server Stats will offer general server information like its Vitals, Hardware information, Memory information, processes, and so on. A security feature will be implemented that allows users to have Cura's database completely wiped upon them sending the compromised phone a secret pattern of their choosing (e.g. send an SMS message containing "phone has been stolen!" to your Android phone to wipe Cura's database, and receive the location of the compromised phone as an SMS to your emergency phone number or as an email to your emergency email address).

Changes: This release features a completely new UI for the Home (Login) screen where you are dropped upon launch. This is where you access/create/update/delete your server accounts, and it's had a complete do-over.
tags | tool, remote, wireless
MD5 | 7793c2a4d7768273e8677d80b00b06b6
Page 1 of 12
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close