Tools
Description
Airebase-ng
This tool is used to attack clients as opposed to the Access Point itself. It has the ability to act as an ad-hoc Access Point.
Aircrack-ng
It is an 802.11 WEP and WPA-PSK keys cracking tool, which is used to recover the keys once enough data packets have been captured.
Airdecap-ng
It decrypts a WEP/WPA crypted pcap file.
Airdecloak-ng
It removes a wep cloaked framed from a pcap file.
Aireplay-ng
This tool is used to generate traffic by injecting packets into a wireless network.
airgraph-ng
This tool is used to display the output given by the airodump-ng graphically.
Airmon-ng
Airmon-ng is a tool used to enable or disable the monitor mode of wireless cards.
Airodump-ng
It is used to capture the packet of the wireless network. If we have a connected GPS receiver, airodump-ng can log the coordinates of the discovered access points.
Airodump-ng-oui-update
It is used to download the OUI (Organizationally Unique Identifier) list from the IEEE.
Airolib-ng
This tool creates and manages a WPA/WPA2 pre-computed hashes tables (essid and password list).
Airserv-ng
It is a wireless network card server that allows a wireless application program to individually use a wireless network card via a Client-server TCP network connection.
Airtun-ng
It is a virtual tunnel interface creator that allows encrypted traffic to be monitored for wIDS purposes and Injects arbitrary traffic into a network.
Asleap
It is used to recover LEAP/PPTP passwords.
Besside-ng
It will automatically crack all WEP & WPA networks in the range and create a log for the WPA handshakes.
Bluelog
It is a Bluetooth site survey tool used for site surveys and monitoring.
BlueMaho
It is used for testing the Bluetooth device’s security.
Bluepot
It is designed to accept and store any malware sent to it and deal with common attacks such as BlueBugging and BlueSnarfing.
BlueRanger
It is a simple Bash script used to locate Bluetooth devices.
Bluesnarfer
It is a Bluetooth snarfing utility that is used to get the device info by scanning the remote device address.
Bully
Bully is the implementation of the WPS brute force attack.
coWPAtty
It is an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication.
Eapmd5pass
It is an authentication mechanism that does not provide the required protection for user authentication credentials. It will mount an offline dictionary attack against the user’s password.
Easside-ng
It is a magic tool that automatically lets you communicate via a WEP- encrypted access point without knowing the key.
Fern Wifi Cracker
It is used for cracking and recovering of WEP/WPA/WPS keys and also runs other network based attacks on wireless or Ethernet.
FreeRADIUS-WPE
It is a patch tool for FreeRADIUS implementation. It simplifies the setup of FreeRADIUS and EAP authentication and adds WPE logging.
Ghost Phisher
It is wireless and Ethernet security auditing and attack tool able to emulate access points and deploy.
GISKismet
It is a wireless recon visualization tool to represent data gathered using Kismet in a flexible manner.
Gqrx
It is a radio receiver powered by GNU Radio SDR framework and the QT graphical toolkit.
Gr-scan
It is a scanner that scans a range of frequencies and prints a list of discovered signals.
hostapd-wpe
It is used to implement an Authenticator and Authentication Server impersonation attacks to obtain client credentials, establish connectivity to the client.
Ivstools
It is used to merge and convert .ivs files.
Kalibrate-rtl
It calculates local oscillator frequency offset using GSM base station.
KillerBee
It is used for exploring and exploiting the security of ZigBee and IEE 802.15.4 networks.
Kismet
It is a wireless network detector, sniffer, and intrusion detection system. You can use it with any wireless card that supports raw monitoring (rfmon) mode.
makeivs-ng
It generates a dummy IVS dump file with a specific WEP key.
mdk3
It is a wireless attack tool for IEEE 802.11 networks that exploit IEEE 802.11 protocol weakness.
mfcuk
It is a MIfare Classic DarkSide key Recovery Tool.
mfoc
It allows you to recover authentication keys from MIFARE classic cards.
mfterm
It is a terminal interface for working with Mifare Classic tags.
Multimon-NG
It is a Digital radio transmission decoder that decodes these digital transmission modes: EAS, UFSK1200, HAPN4800, POCSAG512, MORSE CW.
Packetforge-ng
It is used to create encrypted packets that can subsequently be used for injection. It forges packets: ARP, UDP, ICMP, or custom packets.
PixieWPS
It is used to bruteforce the WPS pin offline.
Pyrit
It is used to create a huge database of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff.
Reaver
It implements a brute-force attack against Wifi Protected Setup register PINs in order to recover WPA/WPA2 passphrases.
redfang
It is used to find non discoverable Bluetooth devices.
RTLSDR Scanner
It is a graphical user interface for USB TV dongles using the OsmoSDR rtlsdr library.
Spooftooph
It is used to automate spoofing or cloning Bluetooth devices’ information.
Tkiptun-ng
It is used to inject few frames into a WPA TKIP network with QoS.
Wesside-ng
It cracks a WEP key of an open network without user interference.
Wifi Honey
It creates five monitor mode interfaces, from which four are used as access points, and the fifth is used for airodump-ng.
wifiphisher
It is an automated phishing attack against Wi-Fi networks.
Wifitap
It is used to establish communication over a WiFi network using traffic injection.
Wifite
It is a wireless auditing tool designed to attack multiple WEP, WPA, and WPS encrypted networks in a row.
wpaclean
It is used to clean captured files to get only the 4-way handshake and a beacon.