A wireless auditing tool implemented as a shell script that uses other tools to do the job.
Like nmap for mapping wifi networks you're not connected to. Maps and tracks wifi networks and devices through raw 802.11 monitoring. Map wireless networks and all clients on each network. Traffic analysis, infer device types. Send packets in response to certain conditions (such as sending 1 gig of traffic or reaching a certain traffic throughput). Deauth attacks. Saves data as YAML for analysis or sending to other software.
Written in Python 3. Installable through Pypi.
How to create a portable GSM BTS which can be used either to create a private ( and vendor free! ) GSM network or for GSM active tapping/interception/hijacking … yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception.
A framework used by penetration testers for building custom exploits for infiltrating systems. Written in Ruby. Comes with a large library of payloads and other nifty and fascinating tools. It's worth learning to use if you're serious about penetration testing or exploit development. Also, the cutting edge of attack technologies winds up coming out of the Metasploit project.
Proof of concept utilities for raw 802.11 injection.
Plug in the MAC address of a network card and it&039;ll tell you who manufactured it.
bluetooth cisco community computing database ethernet forensics hardware lookup networking reference search security service sysadmin tools utilities wifi wireless mac address
A free utility for Windows that extracts your wireless keys in case you forget them.
A collaborative website which maps wireless access points all across the world using information donated by enterprising wardrivers.
A wireless networking system which combines wi-fi as we know it and mesh networking. The idea is that you set up your own wireless network (complete with encryption) but your access point will relay traffic for other Penumbra-enabled APs to extend the range of other clients and get them to a downlink to the public Net.
linux networking wireless mesh penumbra encryption relay
A free ebook about deploying low cost wireless data networks in an infrastructure mode in remote locations.
computers networking wireless ebook free download technology
Find the MAC address of nearly any wi-fi router in Google's wardriving database.
How to turn a simple plug computer into a portable box that uses ARP injection to run man-in-the-middle attacks against wireless users at coffee shops and edit their newsfeeds in realtime.
Project wiki page at freifunk.net for rigging up a wireless access point to a deep discharge battery and a solar panel.
internet hardware alternativepower solar router wireless
This software allows you to stage a brute-force attack against the WPS (Wifi Protected Setup) PIN on certain wireless routers to recover WPA and WPA2 passphrases to compromise wireless access points. On average it takes about seven hours.
liber80211 is an application which runs in the userspace of Android and enables monitor mode on 802.11 devices without requiring root access. Seems to require an external USB wireless interface from Alfa Netwoks.
monitor-mode userspace open-source 802-11 wireless android software github
NoDOGsplash is a captive portal daemon which is part of the OpenWRT embedded OS for wireless access points. It forces users to click through a page of some kind before gaining access to the wireless network proper.