exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from atzeton

Email addressprivate
Websitenullsecurity.net
First Active2011-10-21
Last Active2013-10-18
View User Profile
HWK Wireless Auditing Tool 0.4
Posted Oct 18, 2013
Authored by atzeton | Site nullsecurity.net

hwk is an easy-to-use wireless authentication and de-authentication tool. Furthermore, it also supports probe response fuzzing, beacon injection flooding, antenna alignment and various injection testing modes. Information gathering is selected by default and shows the incoming traffic indicating the packet types.

Changes: Various binaries replaced. Introduced setcap capabilities.
tags | tool, wireless
systems | unix
SHA-256 | 599d4f7ecaaefe8226beca944bc48e8459be941747089d6a88a9ff0beee0cb68
MBR Data Hider 1.0
Posted Oct 18, 2013
Authored by atzeton | Site nullsecurity.net

This tool stores up to 426 bytes in the MBR's bootloader code section of unused devices such as usb drivers, hrd disks (which are not supposed to boot) and other media. GRUB detection is implemented for safety reasons, Windows bootloader code will be shamelessly overwritten.

tags | tool
systems | windows, unix
SHA-256 | 99a64324b1a1754cbc796b406bfbc1ffcd0d9587df1252fd4a11da127f1b3269
HWK Wireless Auditing Tool 0.3.2
Posted Nov 15, 2011
Authored by atzeton | Site nullsecurity.net

hwk is an easy-to-use wireless authentication and deauthentication tool. Furthermore, it also supports probe response fuzzing, beacon injection flooding, antenna alignment and various injection testing modes. Information gathering is selected by default and shows the incoming traffic indicating the packet types.

tags | tool, wireless
systems | unix
SHA-256 | 269dfc0cb05b6ebe89d87065905ef0ef2e595d67b5cc9b2174eb0492869ae6c8
DNS Goblin Search Utility
Posted Nov 5, 2011
Authored by atzeton | Site nullsecurity.net

DNS Goblin is a nasty creature that searches for DNS servers. It uses DNS queries and waits for replies.

tags | tool
systems | unix
SHA-256 | 286935c6d2847e65c3e1b6b90df67ab725a2e05fd89b5f85d64564f492ae2bf3
HWK Wireless Auditing Tool 0.3.1
Posted Oct 21, 2011
Authored by atzeton | Site sourceforge.net

hwk is used for wireless audits, fuzzing and stress testing under Linux. It provides various modes as wireless deauthentication and authentication flooding using a monitor mode interface as well as probe response and beacon fuzzing. Furthermore it comes with some basic injection testing and focusing modes.

tags | tool, wireless
systems | linux, unix
SHA-256 | fd8f96435bfbc2c8b9e273632f1b0d1579d7413d749d7fc059f09193858d585e
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    0 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close