The WiFi Retromodem is a non-destructive replacement of the PCB in an external Hayes Smartmodem 1200 or 2400. Note: while it will fit in the later Smartmodems, the LEDs of the Retromodem in the Hayes Optima series aluminum cases are offset slightly from the letters below. The Retromodem is based on the ZiModem software available on Github. This new version also supports simulated audio dialing just like a real Smartmodem connected to a phone line.
The board can be purchased from this page.
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32.
A compact and portable WiFi reconnaissance suite based on the ESP8266. Packet Monitor with 11 filter types. Deauthentication and Disassociation Detector (HAXX). FTP Honeypot with Canary Tokens. Web Server (WIP). CSV Data logging (WIP).
The custom PCB is basically glue for two pressbuttons, an OLED display, an LED, and a power cell. You could pretty easily bodge one together out of spare parts.
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.
RS232 interface on one end, wifi transceiver on the other pretending to be a Hayes-compatible modem. Has an OLED panel on it so you can see what it's doing.
An open source device to connect a computer with an RS232 serial port to a telnet BBS. It does not use an analog phone line but internet through a wifi connection. Behaves like a Hayes dial-up modem, and it is designed and built for old computers. Plug it in, fire up a terminal emulator, and use the Hayes AT command set to tell it what to do. Can theoretically be used with any computer that has an RS-232 port.
Occasionally the designer sells them on eBay, but you can build your own.
Like nmap for mapping wifi networks you're not connected to. Maps and tracks wifi networks and devices through raw 802.11 monitoring. Map wireless networks and all clients on each network. Traffic analysis, infer device types. Send packets in response to certain conditions (such as sending 1 gig of traffic or reaching a certain traffic throughput). Deauth attacks. Saves data as YAML for analysis or sending to other software.
Written in Python 3. Installable through Pypi.
API documentation for wigle.net.
A specialized packet sniffer that grabs images from wireless networks as people surf the net.
A framework used by penetration testers for building custom exploits for infiltrating systems. Written in Ruby. Comes with a large library of payloads and other nifty and fascinating tools. It's worth learning to use if you're serious about penetration testing or exploit development. Also, the cutting edge of attack technologies winds up coming out of the Metasploit project.
Proof of concept utilities for raw 802.11 injection.
Plug in the MAC address of a network card or Bluetooth device and it'll tell you who manufactured it.
A free utility for Windows that extracts your wireless keys in case you forget them.
A collaborative website which maps wireless access points all across the world using information donated by enterprising wardrivers.
Open source captive portal software for setting up your own wireless hotspot.
This software allows you to stage a brute-force attack against the WPS (Wifi Protected Setup) PIN on certain wireless routers to recover WPA and WPA2 passphrases to compromise wireless access points. On average it takes about seven hours.
An analysis of how to estimate the bandwidth loss of single vs. multiple-radio mesh nodes based on traffic.
A utility written in Python that monitors a wireless network to find the most active users and lets you mess with their connection. You can spy on them or inject arbitrary stuff into their web traffic. Can also be used as a jammer. Pretty heavy dependencies but nobody in their right mind would rewrite them all for a single utility. Supports credential harvesting and dns spoofing.
Deprecated. Read through this to get an idea of how things work.
4983 links, including 378 private