Category: TP-LINK


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Brute-forceCaptive PortalEvil TwinKaliMacMac ChangerNEW TOOLSPcapPenetration TestSniffAirTP-LINKWPA2

SniffAir – A Framework For Wireless Pentesting

SniffAir is an open-source wireless security framework which provides the ability to easily parse passively collected wireless data as well as launch sophisticated wireless attacks. SniffAir takes care of the hassle associated with managing large or multiple pcap files while thoroughly cross-examining and analyzing the traffic, looking for potential security flaws. Along with the prebuilt queries, SniffAir allows users to create custom queries for analyzing the wireless data stored in the backend SQL database. SniffAir is built on the concept of using these queries…

GhostTunnelHIDNEW TOOLSPacket InjectionProbe RequestTP-LINK

GhostTunnel – A Covert Backdoor Transmission Method That Can Be Used In An Isolated Environment

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device only to release the payload (agent), then the HID device can be removed after the payload is released.GhostTunnel use 802.11 Probe Request Frames and Beacon Frames to communicate and doesn't need to establish a wifi connection. Exactly, it communicates by embedding data in beacon and probe requests. We publish the GhostTunnel server and windows agent implemented in c/c++. The agent…

MacNEW TOOLSSniffingTP-LINKTP-Link-defaults

TP-Link-defaults – Python Script For Trying Default Passwords For Some TP-Link Hotspots

Python script for trying default passwords for some TP-Link HotspotsInspired by Usageusage: [-h] [-p]Python script for trying default passwords for some TP-Link Hotspotsoptional arguments: -h, --help show this help message and exit -p, --print-all print all found ssid'sFOR EDUCATIONAL USE ONLYConfigtimeout stop sniffing after a given timeprint_all print all found ssid'sDownload TP-Link-defaults