Tools Category

NETATTACK 2

An Advanced Wireless Network Scan and Attack Script     NETATTACK 2 is a python script that scans and attacks local and wireless networks. Everything is super easy because of the GUI that makes it unnecessary to remember commands and parameters. FUNCTIONS SCAN-FUNCTIONS Scan for Wi-Fi networks Scan for local Read more…

Loading

HoneyPot & HoneyNet

Virtual attack and defense system   A honeypot is a term used to describe a computer or network setup with the purpose of attracting computer hackers. These computers allow a system administrator or security expert to analyze how a computer hacker may attempt to hack a network without risking the Read more…

Loading

Tools Category

WiFi-Pumpkin v0.8.5

WiFi-Pumpkin Framework for Rogue Wi-Fi Access Point Attack     WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In The Middle attack, but the list of features is quite broad. Installation Python 2.7 git Read more…

Loading

Tools Category

Unicorn

Unicorn PowerShell downgrade attack   Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. Usage is simple, just run Magic Read more…

Loading

Buffer overflow attack

What is Buffer overflow? Buffer overflow, in the presence of a buffer overflow security vulnerabilities in the computer, the attacker can exceed the normal length of the number of characters to fill a domain, usually the memory address. In some cases, these excess characters can be run as “executable” code. Read more…

Loading