Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.
☆273Feb 26, 2014Updated 12 years ago
Alternatives and similar repositories for wireless-ids
Users that are interested in wireless-ids are comparing it to the libraries listed below
Sorting:
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Mar 24, 2014Updated 11 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Jan 7, 2014Updated 12 years ago
- Wireless Auditing, Intrusion Detection & Prevention System☆521Oct 22, 2017Updated 8 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- OpenWIPS-ng is an open source and modular Wireless IPS (Intrusion Prevention System)☆73Nov 27, 2018Updated 7 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Easily Expandable Wireless Intrusion Detection System☆30Oct 12, 2020Updated 5 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Sep 21, 2018Updated 7 years ago
- Detect, capture, crack WPA/2 handshakes, WEP Keys and geotag with Android GPS☆213Jan 13, 2015Updated 11 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆556Feb 1, 2020Updated 6 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆308Sep 1, 2022Updated 3 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- Atmel MARC4 disassembler☆16Mar 29, 2013Updated 12 years ago
- Rogue AP killer☆92Jan 24, 2018Updated 8 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- ☆17Jan 12, 2018Updated 8 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,097Aug 21, 2018Updated 7 years ago
- Prints the IPs on your local network that're sending the most packets☆152Jul 20, 2021Updated 4 years ago
- (Unofficial) Python API for http://netcraft.com☆15Jul 6, 2016Updated 9 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆593Mar 3, 2022Updated 3 years ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- Automated man-in-the-middle attack tool.☆52Sep 4, 2014Updated 11 years ago
- new WPS attack tool☆60Sep 13, 2015Updated 10 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆141Jul 26, 2022Updated 3 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆244Nov 23, 2020Updated 5 years ago
- A Linux Python application to create maps of 802.11 networks☆78Oct 13, 2013Updated 12 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,264Dec 18, 2021Updated 4 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- Wi-Fi Backdoors☆42Aug 5, 2015Updated 10 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- 802.11 IDS, visualizer, and analytics platform for the web☆29Jan 4, 2023Updated 3 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago