APs_Beacon – With this script you can spam WiFi APs/Hotspots

aps_becon

With this script you can spam WiFi APs. How to run it? Download “APs_Beacon.sh” and “SSID_List.txt” or type “git clone https://github.com/BlueArduino20/APs_Beacon“ You need to give execution permissions by typing: “chmod +x APs_Beacon.sh” You open the script: “./APs_Beacon.sh” That’s all. [php]git clone https://github.com/BlueArduino20/APs_Beacon cd APs_Beacon chmod +x APs_Beacon.sh ./APs_Beacon.sh[/php] CREDITS: BlueArduino20 DOWNLOAD APs_Beacon We recommend usage … Read more APs_Beacon – With this script you can spam WiFi APs/Hotspots

TrackerJacker – Tracks WiFi devices by capturing raw 802.11 frames in monitor mode

wifi

Finds and tracks wifi devices through raw 802.11 monitoring. PyPI page: https://pypi.python.org/pypi/trackerjacker Install pip3 install trackerjacker Usage Find detailed usage like this: trackerjacker -h There are 2 major usage modes for trackerjacker: map mode and track mode: Map mode example Map mode is used to find the Access Points and Devices within the range. Think … Read more TrackerJacker – Tracks WiFi devices by capturing raw 802.11 frames in monitor mode

WiFi Frequency Hacker – Regulatory Domain Configuration That Doesn’t Limit You

wifi

wifi-frequency-hacker A modified frequency regulatory domain configuration that doesn’t limit you. Overview Different countries enforce different frequency restrictions on the various wifi channels. This can be a pain if your card/OS is forcing you into a different configuration than the one you need. There are numerous reasons why this may be happening. From drivers favouring … Read more WiFi Frequency Hacker – Regulatory Domain Configuration That Doesn’t Limit You

How Thieves Can Target High End Devices Using Wifi Signals

criminal

How Thieves Can Target High-End Devices Using Wifi Signals Disclaimer HackingVision does not condone illegal use of this software nor does it promote illegal use of this the software mentioned within this article. The content is provided only as a convenience to the educational and security community. It seems thieves can be anywhere looking for … Read more How Thieves Can Target High End Devices Using Wifi Signals

Rollmac – Bypass Free Wifi Time & Data Restriction

free wifi

Rollmac (Credits: violentshell) Free networks often impose either a time or data restriction and this can be used quickly. When this happens you can change your mac address and reconnect, but this is annoying, and it takes time. In addition, most networks will ask you to re-accept the terms and conditions of the network in … Read more Rollmac – Bypass Free Wifi Time & Data Restriction

Fluxion – Easy to use wifi cracker, to test your own network

fluxion

Fluxion is a easy to use wifi cracker, to test your own network. Fluxion is the future of MITM WPA attacks Fluxion is a remake of linset by vk496 with (hopefully) less bugs and more functionality. It’s compatible with the latest release of Kali (rolling). Latest builds (stable) and (beta) can be found here here. … Read more Fluxion – Easy to use wifi cracker, to test your own network

wifijammer

wifi-jamming

wifijammer Continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block radius with heavy access point saturation. Granularity is given in the options for more effective targeting. Requires: python 2.7, python-scapy, a wireless card … Read more wifijammer

Increasing Wifi TX Power Signal Strength in Linux

wireless-power

Increasing Wifi TX Power Signal Strength in Linux TX power is a setting for the radio to set its transmitting strength. Higher values amplify the signal strength, but also increase power usage. Tx power level 1 is always the highest level of power a wireless access point. The transmit power level is assigned an integer … Read more Increasing Wifi TX Power Signal Strength in Linux

Subscribe to our newsletter!

yoast seo premium free