The Power Glove UHID (Ultimate Human Interface Device) is a modification of the 1989 Nintendo Power Glove that integrates an ARM microcontroller, WiFi communication and 9/10 axis IMU into the original device, allowing you to repurpose your infamous gaming accessory into a device with limitless possibility (imagination sold separately).
This a set of the boards used in the first iteration of the project. The boards are provided as-is without any additional components. You should be aware that integrating them into your own Glove will require a fair bit of DIY work (and a lack of squeamishness when it comes to modifying classic video game accessories).
An older website about wireless, wifi, antennas, and information thereof.
This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security (all resources are in English only).
The FCC, some FAANGs, and others are motivated to see more innovation in the wireless space to try to see what new tech can come about. Unfortunately, the expertise is surrounded in jargon, domain and tribal knowledge, and can be very frustrating for someone who wants to take the shortcut route to running a mobile network. I aim to try to cut through a lot of the jargon and extra stuff that can get a person lost between the the excitement of operating a mobile network and manifesting it into physical reality.
I had a lot of exposure to testing early stage LTE/5G networks. My motivation is to try to demystify as much of the mobile network as I can for anyone with a strong networking but non-wireless focused background.
A Mexican company that designs and sells hacker toys, security auditing tools, and educational devices. They even sell products suitable for teaching kids.
DrSchottky's fork of the Pwnagotchi firmware so that development can continue.
A wireless auditing tool implemented as a shell script that uses other tools to do the job.
Like nmap for mapping wifi networks you're not connected to. Maps and tracks wifi networks and devices through raw 802.11 monitoring. Map wireless networks and all clients on each network. Traffic analysis, infer device types. Send packets in response to certain conditions (such as sending 1 gig of traffic or reaching a certain traffic throughput). Deauth attacks. Saves data as YAML for analysis or sending to other software.
Written in Python 3. Installable through Pypi.
How to create a portable GSM BTS which can be used either to create a private (and vendor free!) GSM network or for GSM active tapping/interception/hijacking … yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception.
A framework used by penetration testers for building custom exploits for infiltrating systems. Written in Ruby. Comes with a large library of payloads and other nifty and fascinating tools. It's worth learning to use if you're serious about penetration testing or exploit development. Also, the cutting edge of attack technologies winds up coming out of the Metasploit project.
Proof of concept utilities for raw 802.11 injection.
A free utility for Windows that extracts your wireless keys in case you forget them.
A collaborative website which maps wireless access points all across the world using information donated by enterprising wardrivers.
A free ebook about deploying low cost wireless data networks in an infrastructure mode in remote locations.
Find the MAC address of nearly any wi-fi router in Google's wardriving database.
Project wiki page at freifunk.net for rigging up a wireless access point to a deep discharge battery and a solar panel.
This software allows you to stage a brute-force attack against the WPS (Wifi Protected Setup) PIN on certain wireless routers to recover WPA and WPA2 passphrases to compromise wireless access points. On average it takes about seven hours.