From 90b5156caabe0e215330e921678133f0d67e5302 Mon Sep 17 00:00:00 2001 From: Meitar M Date: Fri, 13 Mar 2020 20:14:42 -0400 Subject: [PATCH 1/2] Add PSKracker, a fast WPA/WPA2/WPS cracking tool for pentesters. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index e2b0d73..a99dc77 100644 --- a/README.md +++ b/README.md @@ -452,6 +452,7 @@ See also [awesome-industrial-control-system-security](https://github.com/hslatma * [Fluxion](https://github.com/FluxionNetwork/fluxion) - Suite of automated social engineering based WPA attacks. * [KRACK Detector](https://github.com/securingsam/krackdetector) - Detect and prevent KRACK attacks in your network. * [Kismet](https://kismetwireless.net/) - Wireless network detector, sniffer, and IDS. +* [PSKracker](https://github.com/soxrok2212/PSKracker) - Collection of WPA/WPA2/WPS default algorithms, password generators, and PIN generators written in C. * [pwnagotchi](https://github.com/evilsocket/pwnagotchi) - Deep reinforcement learning based AI that learns from the Wi-Fi environment and instruments BetterCAP in order to maximize the WPA key material captured. * [Reaver](https://code.google.com/archive/p/reaver-wps) - Brute force attack against WiFi Protected Setup. * [WiFi-Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) - Framework for rogue Wi-Fi access point attack. From 9e17d5bff1d2a39fd04f8a1e76987cc06da60ffc Mon Sep 17 00:00:00 2001 From: Meitar M Date: Fri, 13 Mar 2020 20:20:19 -0400 Subject: [PATCH 2/2] Remove DWF; the project ended due to lack of community involvement. --- README.md | 1 - 1 file changed, 1 deletion(-) diff --git a/README.md b/README.md index a99dc77..0391d04 100644 --- a/README.md +++ b/README.md @@ -742,7 +742,6 @@ See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing). * [CXSecurity](https://cxsecurity.com/) - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability. * [China National Vulnerability Database (CNNVD)](http://www.cnnvd.org.cn/) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation. * [Common Vulnerabilities and Exposures (CVE)](https://cve.mitre.org/) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities. -* [Distributed Weakness Filing (DWF)](https://distributedweaknessfiling.org/) - Federated CNA (CVE Number Authority) mirroring MITRE's CVE database and offering additional CVE-equivalent numbers to otherwise out-of-scope vulnerability disclosures. * [Exploit-DB](https://www.exploit-db.com/) - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security. * [Full-Disclosure](http://seclists.org/fulldisclosure/) - Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources. * [HPI-VDB](https://hpi-vdb.de/) - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.