| Tools |
Description |
| Airebase-ng |
This tool is used to attack clients as opposed to the Access Point itself. It has the ability to act as an ad-hoc Access Point. |
| Aircrack-ng |
It is an 802.11 WEP and WPA-PSK keys cracking tool, which is used to recover the keys once enough data packets have been captured. |
| Airdecap-ng |
It decrypts a WEP/WPA crypted pcap file. |
| Airdecloak-ng |
It removes a wep cloaked framed from a pcap file. |
| Aireplay-ng |
This tool is used to generate traffic by injecting packets into a wireless network. |
| airgraph-ng |
This tool is used to display the output given by the airodump-ng graphically. |
| Airmon-ng |
Airmon-ng is a tool used to enable or disable the monitor mode of wireless cards. |
| Airodump-ng |
It is used to capture the packet of the wireless network. If we have a connected GPS receiver, airodump-ng can log the coordinates of the discovered access points. |
| Airodump-ng-oui-update |
It is used to download the OUI (Organizationally Unique Identifier) list from the IEEE. |
| Airolib-ng |
This tool creates and manages a WPA/WPA2 pre-computed hashes tables (essid and password list). |
| Airserv-ng |
It is a wireless network card server that allows a wireless application program to individually use a wireless network card via a Client-server TCP network connection. |
| Airtun-ng |
It is a virtual tunnel interface creator that allows encrypted traffic to be monitored for wIDS purposes and Injects arbitrary traffic into a network. |
| Asleap |
It is used to recover LEAP/PPTP passwords. |
| Besside-ng |
It will automatically crack all WEP & WPA networks in the range and create a log for the WPA handshakes. |
| Bluelog |
It is a Bluetooth site survey tool used for site surveys and monitoring. |
| BlueMaho |
It is used for testing the Bluetooth device's security. |
| Bluepot |
It is designed to accept and store any malware sent to it and deal with common attacks such as BlueBugging and BlueSnarfing. |
| BlueRanger |
It is a simple Bash script used to locate Bluetooth devices. |
| Bluesnarfer |
It is a Bluetooth snarfing utility that is used to get the device info by scanning the remote device address. |
| Bully |
Bully is the implementation of the WPS brute force attack. |
| coWPAtty |
It is an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication. |
| Eapmd5pass |
It is an authentication mechanism that does not provide the required protection for user authentication credentials. It will mount an offline dictionary attack against the user's password. |
| Easside-ng |
It is a magic tool that automatically lets you communicate via a WEP- encrypted access point without knowing the key. |
| Fern Wifi Cracker |
It is used for cracking and recovering of WEP/WPA/WPS keys and also runs other network based attacks on wireless or Ethernet. |
| FreeRADIUS-WPE |
It is a patch tool for FreeRADIUS implementation. It simplifies the setup of FreeRADIUS and EAP authentication and adds WPE logging. |
| Ghost Phisher |
It is wireless and Ethernet security auditing and attack tool able to emulate access points and deploy. |
| GISKismet |
It is a wireless recon visualization tool to represent data gathered using Kismet in a flexible manner. |
| Gqrx |
It is a radio receiver powered by GNU Radio SDR framework and the QT graphical toolkit. |
| Gr-scan |
It is a scanner that scans a range of frequencies and prints a list of discovered signals. |
| hostapd-wpe |
It is used to implement an Authenticator and Authentication Server impersonation attacks to obtain client credentials, establish connectivity to the client. |
| Ivstools |
It is used to merge and convert .ivs files. |
| Kalibrate-rtl |
It calculates local oscillator frequency offset using GSM base station. |
| KillerBee |
It is used for exploring and exploiting the security of ZigBee and IEE 802.15.4 networks. |
| Kismet |
It is a wireless network detector, sniffer, and intrusion detection system. You can use it with any wireless card that supports raw monitoring (rfmon) mode. |
| makeivs-ng |
It generates a dummy IVS dump file with a specific WEP key. |
| mdk3 |
It is a wireless attack tool for IEEE 802.11 networks that exploit IEEE 802.11 protocol weakness. |
| mfcuk |
It is a MIfare Classic DarkSide key Recovery Tool. |
| mfoc |
It allows you to recover authentication keys from MIFARE classic cards. |
| mfterm |
It is a terminal interface for working with Mifare Classic tags. |
| Multimon-NG |
It is a Digital radio transmission decoder that decodes these digital transmission modes: EAS, UFSK1200, HAPN4800, POCSAG512, MORSE CW. |
| Packetforge-ng |
It is used to create encrypted packets that can subsequently be used for injection. It forges packets: ARP, UDP, ICMP, or custom packets. |
| PixieWPS |
It is used to bruteforce the WPS pin offline. |
| Pyrit |
It is used to create a huge database of pre-computed WPA/WPA2-PSK authentication phase in a space-time-tradeoff. |
| Reaver |
It implements a brute-force attack against Wifi Protected Setup register PINs in order to recover WPA/WPA2 passphrases. |
| redfang |
It is used to find non discoverable Bluetooth devices. |
| RTLSDR Scanner |
It is a graphical user interface for USB TV dongles using the OsmoSDR rtlsdr library. |
| Spooftooph |
It is used to automate spoofing or cloning Bluetooth devices' information. |
| Tkiptun-ng |
It is used to inject few frames into a WPA TKIP network with QoS. |
| Wesside-ng |
It cracks a WEP key of an open network without user interference. |
| Wifi Honey |
It creates five monitor mode interfaces, from which four are used as access points, and the fifth is used for airodump-ng. |
| wifiphisher |
It is an automated phishing attack against Wi-Fi networks. |
| Wifitap |
It is used to establish communication over a WiFi network using traffic injection. |
| Wifite |
It is a wireless auditing tool designed to attack multiple WEP, WPA, and WPS encrypted networks in a row. |
| wpaclean |
It is used to clean captured files to get only the 4-way handshake and a beacon. |