All Projects → mvondracek → wifimitm

mvondracek / wifimitm

Licence: MIT license
Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects
c
50402 projects - #5 most used programming language
Roff
2310 projects
Makefile
30231 projects

Projects that are alternatives of or similar to wifimitm

refluxion
Refluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-48.98%)
Mutual labels:  wpa, wpa2
hashcat-wpa-server
Hashcat WPA/WPA2 server
Stars: ✭ 26 (-46.94%)
Mutual labels:  wpa, password-cracking
WPA2-FritzBox-Pswd-Wordlist-Generator
This Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16 Numbers in length. So it could get a bit large.
Stars: ✭ 22 (-55.1%)
Mutual labels:  wpa, wpa2
Wifi-Cracker
Wifi Cracking
Stars: ✭ 128 (+161.22%)
Mutual labels:  wpa, wep
vietnamese-password-dicts
Tổng hợp danh sách mật khẩu wifi tiếng Việt sử dụng cho aircrack-ng
Stars: ✭ 40 (-18.37%)
Mutual labels:  wpa
Socialfishmobile
📱 🐟 An app to remote control SocialFish.
Stars: ✭ 200 (+308.16%)
Mutual labels:  phishing
Gitem
A Github organization reconnaissance tool.
Stars: ✭ 190 (+287.76%)
Mutual labels:  phishing
Umbrella
A Phishing Dropper designed to Pentest.
Stars: ✭ 180 (+267.35%)
Mutual labels:  phishing
qd-realization
A quasi-deterministic (Q-D) channel implementation in MATLAB software
Stars: ✭ 29 (-40.82%)
Mutual labels:  wlan
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (-14.29%)
Mutual labels:  phishing
I See You
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+402.04%)
Mutual labels:  phishing
Macphish
Office for Mac Macro Payload Generator
Stars: ✭ 202 (+312.24%)
Mutual labels:  phishing
Auto-Besside-Capturer
Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.
Stars: ✭ 28 (-42.86%)
Mutual labels:  wpa2
Blackeye Python
BlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only
Stars: ✭ 191 (+289.8%)
Mutual labels:  phishing
Thechoice
The linux choice collection tools
Stars: ✭ 245 (+400%)
Mutual labels:  phishing
Socialfish
Phishing Tool & Information Collector
Stars: ✭ 2,522 (+5046.94%)
Mutual labels:  phishing
windfall-elimination
Windfall Elimination Provision Awareness Project: improving the experience of retirees around an obscure Social Security rule affecting 8+ states (previously https://ssacalculator.org)
Stars: ✭ 23 (-53.06%)
Mutual labels:  wep
Phishmailer
Generate Professional Phishing Emails Fast And Easy
Stars: ✭ 227 (+363.27%)
Mutual labels:  phishing
Pot
Phishing on Twitter
Stars: ✭ 223 (+355.1%)
Mutual labels:  phishing
Isthislegit
Dashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (+412.24%)
Mutual labels:  phishing

wifimitm logo

Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks

Target OS Python version PRs Welcome

Is your network secure? How easy is it for someone to eavesdrop on you?

Abstract

Widely used network technologies and principles of wireless security suffer weaknesses that can be exploited to perform the Man-in-the-Middle attack, allowing to eavesdrop or to spoof the network communication. The work focuses on possibilities of automation of the attack with a utilization of available specialized tools. The outcome of the research is the wifimitm package and the wifimitmcli CLI tool, both implemented in Python. The emphasis was placed on possibilities of further incorporation of the developed tool. The package provides functionality for automated MitM attack and can be used by other software. The wifimitmcli tool is capable of performing a successful fully automated attack without any intervention from an attacker.

This research can be used for automated penetration testing and forensic investigation. Finally, a popularization of the fact that such severe attacks can be successfully automated should be used to raise the public awareness about the information security. In these days, this issue involves almost every one of us.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].