All Hot News Popular Media
Wireless File, PacketStorm Security

Sun, 22 Nov 2015 15:55:55 GMT
Aircrack-ng Wireless Network Tools 1.2 RC4
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Sun, 28 Jun 2015 06:22:22 GMT
Aircrack-ng Wireless Network Tools 1.2 RC3
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Tue, 28 Apr 2015 00:52:43 GMT
TRENDnet TEW-818RDU PIN Disclosure
TRENDnet TEW-818RDU versions 1 ("ac1900") and 2 ("ac3200") PIN disclosure exploit.

Fri, 10 Apr 2015 22:05:23 GMT
DAWIN - Distributed Audit and Wireless Intrustion Notification 2.0
DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual.

Sun, 04 Jan 2015 23:33:33 GMT
Aircrack-ng Wireless Network Tools 1.2 RC2
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Wed, 17 Sep 2014 22:34:16 GMT
WifiPhisher Phishing Tool
Wifiphisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining WPA credentials.

Tue, 01 Apr 2014 23:02:22 GMT
DAWIN - Distributed Audit and Wireless Intrustion Notification
DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual.

Thu, 05 Dec 2013 01:11:11 GMT
Aircrack-ng Wireless Network Tools 1.2 Beta 3
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Wed, 04 Dec 2013 03:19:46 GMT
Pytacle Alpha2
pytacle is a tool inspired by tentacle. It automates the task of sniffing GSM frames of the air, extracting the key exchange, feeding kraken with the key material and finally decode/decrypt the voice data. All You need is a USRP (or similar) to capture the GSM band and a kraken instance with the berlin tables (only about 2TB).

Mon, 04 Nov 2013 23:40:27 GMT
SkyJack Drone Hijacker
Skyjack takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control.

Fri, 18 Oct 2013 01:30:01 GMT
Bluelog Bluetooth Scanner/Logger 1.1.2
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.

Tue, 15 Oct 2013 13:05:05 GMT
HWK Wireless Auditing Tool 0.4
hwk is an easy-to-use wireless authentication and de-authentication tool. Furthermore, it also supports probe response fuzzing, beacon injection flooding, antenna alignment and various injection testing modes. Information gathering is selected by default and shows the incoming traffic indicating the packet types.

Mon, 26 Aug 2013 14:43:33 GMT
ARRIS DG860A WPS PIN Generator
This is a ruby script that will generate the default WPS PIN for the Arris DG860A providing you know the HFC MAC address.

Fri, 19 Apr 2013 16:28:42 GMT
Wi-fEye Wireless Pentesting Tool 1.0 Beta
Wi-fEye is designed to help with network penetration testing. It allows the user to perform a number of powerful attack automatically including WEP/WPA cracking, session hijacking and more.

Mon, 01 Apr 2013 20:22:22 GMT
Wireless Decoder 1.0
Wireless Decoder is an application that demonstrates how to recover wireless passwords on Vista/Win7/Win8. Comes with source and the binary.

Tue, 12 Mar 2013 18:22:22 GMT
Bluelog Bluetooth Scanner/Logger 1.1.1
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.

Tue, 12 Feb 2013 04:06:07 GMT
ChronIC RF Hacking Tool
ChronIC is the Chronos Integrated Commander, a wearable Sub-GHz RF hacking tool. Written in python.

Tue, 12 Feb 2013 03:40:09 GMT
Bluefog 0.0.4
Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.

Tue, 15 Jan 2013 03:05:48 GMT
Net-War Reaver Wrapper
This tool is a wrapper for the reaver WPS attack toolkit. As there is no automatic way to prescan, decide, and then start the attack, this wrapper takes care of it. Written in perl.

Sun, 30 Dec 2012 22:22:22 GMT
Bluefog 0.0.3
Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.

Sat, 29 Dec 2012 18:04:38 GMT
Zykeys Wireless Tool
Zykeys demonstrates how default wireless settings are derived on some models of ZyXEL routers.

Sat, 22 Dec 2012 20:42:11 GMT
Bluelog Bluetooth Scanner/Logger 1.1.0
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.

Thu, 04 Oct 2012 03:50:11 GMT
Bluefog 0.0.2
Bluefog is a tool that can generate an essentially unlimited number of phantom Bluetooth devices. It can be used to test Bluetooth scanning and monitoring systems, make it more difficult for attackers to lock onto your devices, or otherwise complicate the normal operation of Bluetooth devices. Technically, Bluefog can work with just one Bluetooth adapter, but it works much better when you connect multiple adapters. Up to four radios are currently supported simultaneously.

Fri, 13 Jul 2012 04:31:07 GMT
RFIDIOt Python Library For RFID Readers 1.0d
RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r).


Cura 1.4
Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs directly from a server, a SysMonitor module that visually graphs CPU and RAM usage percentages, access to Nmap, and Server Stats will offer general server information like its Vitals, Hardware information, Memory information, processes, and so on. A security feature will be implemented that allows users to have Cura's database completely wiped upon them sending the compromised phone a secret pattern of their choosing (e.g. send an SMS message containing "phone has been stolen!" to your Android phone to wipe Cura's database, and receive the location of the compromised phone as an SMS to your emergency phone number or as an email to your emergency email address).
view page: 102

Check out Design Hotels' Mountain Magic deals in places such as the Alps and upstate New York’s Catskill Mountains. Get up to 20% off the best available rate by booking at least 80 days in advance.

Start: 17 Oct 2017 | End: 08 Apr 2018

Beach time essential - beach throw. We offer over 300 different styles, up 70% OFF, enjoy extra 35-4,50-6,80-9,100-12 with “RGFUN”. FREE SHIPPING WORLDWIDE.

Code: RGFUN

Start: 15 May 2017 | End: 06 May 2018

Winter Rooms for 29 or less!

Start: 26 Oct 2017 | End: 31 Mar 2018

Search All Amazon* UK* DE* FR* JP* CA* CN* IT* ES* IN* BR* MX
Booking.com B.V. is based in Amsterdam in the Netherlands. Ready for some statistics? Our 1,534,024 properties, including 860,482 holiday rentals, are located in 123,105 destinations in 229 countries and territories, and are supported internationally by 198 offices in 70 countries.
2013 Copyright © Techhap.com Mobile version 2015 | PeterLife & company
Terms of use Link at is mandatory if site materials are using fully or particulary.
Were treated to the site administrator, a cup of coffee *https://paypal.me/peterlife
Yandex.ru