TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.
RS232 interface on one end, wifi transceiver on the other pretending to be a Hayes-compatible modem. Has an OLED panel on it so you can see what it's doing.
An open source device to connect a computer with an RS232 serial port to a telnet BBS. It does not use an analog phone line but internet through a wifi connection. Behaves like a Hayes dial-up modem, and it is designed and built for old computers. Plug it in, fire up a terminal emulator, and use the Hayes AT command set to tell it what to do. Can theoretically be used with any computer that has an RS-232 port.
Occasionally the designer sells them on eBay, but you can build your own.
Like nmap for mapping wifi networks you're not connected to. Maps and tracks wifi networks and devices through raw 802.11 monitoring. Map wireless networks and all clients on each network. Traffic analysis, infer device types. Send packets in response to certain conditions (such as sending 1 gig of traffic or reaching a certain traffic throughput). Deauth attacks. Saves data as YAML for analysis or sending to other software.
Written in Python 3. Installable through Pypi.
API documentation for wigle.net.
A specialized packet sniffer that grabs images from wireless networks as people surf the net.
A framework used by penetration testers for building custom exploits for infiltrating systems. Written in Ruby. Comes with a large library of payloads and other nifty and fascinating tools. It's worth learning to use if you're serious about penetration testing or exploit development. Also, the cutting edge of attack technologies winds up coming out of the Metasploit project.
Proof of concept utilities for raw 802.11 injection.
A lengthy how-to article about building an open source PBX using Linux and Asterisk that uses wireless for its network link. A fully portable wireless telephony system, in other words.
Plug in the MAC address of a network card or Bluetooth device and it'll tell you who manufactured it.
A free utility for Windows that extracts your wireless keys in case you forget them.
A collaborative website which maps wireless access points all across the world using information donated by enterprising wardrivers.
Open source captive portal software for setting up your own wireless hotspot.
This software allows you to stage a brute-force attack against the WPS (Wifi Protected Setup) PIN on certain wireless routers to recover WPA and WPA2 passphrases to compromise wireless access points. On average it takes about seven hours.
An analysis of how to estimate the bandwidth loss of single vs. multiple-radio mesh nodes based on traffic.
A utility written in Python that monitors a wireless network to find the most active users and lets you mess with their connection. You can spy on them or inject arbitrary stuff into their web traffic. Can also be used as a jammer. Pretty heavy dependencies but nobody in their right mind would rewrite them all for a single utility. Supports credential harvesting and dns spoofing.
Deprecated. Read through this to get an idea of how things work.
electronics retrocomputing How to build a 9600 bps modem for a c64 that is actually a wifi network interface. howto
3697 links, including 185 private