![]() Keyboard, mouse and serial emulation) and a ESP-12 (i.e. WHID stands for WiFi-HID injector, it is an USB-Rubberducky / Bad-USB on steroids, designed to fulfill RedTeamers needs during their engagements. ![]() However, Offensive Security folks were always seeking a cheap and dedicated hardware that could be controlled remotely (i.e. Since the first public appearance of HID Attacks, many awesome researches, tools and devices have been released. The main goal of this project is auditing as many system as possible in country-wide or in a wide IP range. It consists open source tools such masscan, ncrack, dsss and gives you the flexibility of using them with a combination. Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. Starts deauthentication attack (for fake access points) PiKarma : Detects wireless network attacks performed by KARMA module (fake AP). ![]() PiDense : Monitor illegal wireless network activities.PiFinger: Searches for wifi-pineapple traces and calculate wireless network security score. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |