Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      airgeddon v10.4 - All-in-one Wireless Toolkit

      Recommended Posts


      Hidden Content

        Give reaction to this post to see the hidden content.


      This is a multi-use bash script for Linux systems to audit wireless networks.


          Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing

          DoS over wireless networks using different methods

          Assisted Handshake file capturing

          Cleaning and optimizing Handshake captured files

          Offline password decrypting on WPA/WPA2 captured files (dictionary, bruteforce and rule-based)

          Evil Twin attacks (Rogue AP)

              Only Rogue/Fake AP version to sniff using external sniffer (Hostapd + DHCP + DoS)

              Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap)

              Integrated sniffing, sslstrip (Hostapd + DHCP + DoS + Ettercap + Sslstrip)

              Integrated sniffing, sslstrip2 and BeEF browser exploitation framework (Hostapd + DHCP + DoS + Bettercap + BeEF)

              Captive portal with “DNS blackhole” to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd)

              Optional MAC spoofing for all Evil Twin attacks

          WPS features

              WPS scanning (wash). Self-parameterization to avoid “bad FCS” problem

              Custom PIN association (bully and reaver)

              Pixie Dust attacks (bully and reaver)

              Bruteforce PIN attacks (bully and reaver)

              Parameterizable timeouts

              Known WPS PINs attack (bully and reaver), based on online PIN database with auto-update

              Integration of the most common PIN generation algorithms

          WEP All-in-One attack (combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc.)

          Compatibility with many Linux distributions (see Requirements section)

          Easy targeting and selection in every section

          Drag and drop files on console window for entering file paths

          Dynamic screen resolution detection and windows auto-sizing for optimal viewing

          Controlled Exit. Cleaning tasks and temp files. Option to keep monitor mode if desired

          Multilanguage support and autodetect OS language feature (see Supported Languagessection)

          Help hints in every zone/menu for easy use

          Auto-update. Script checks for newer version if possible

          Docker container for easy and quick deployment

          Http proxy auto detection for updates

      Changelog v10.4

          Removed deprecated route command
          Fixed error on WPS PINs found in database counter
          Sslstrip Evil Twin attack replaced by Bettercap-Sslstrip2 Evil Twin attack, sslstrip dependency removed
          Fixed error on Evil Twin attacks when tmux and Bettercap 2.x used
          Fixed wrong username shown on asleap decryption after capture for Enterprise Evil Twin attack
          Fixed freezing while trying to resume reaver session

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post

      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Powerful Telegram Members Scraping and Adding Toolkit.
              ADDS IN BULK[by user id, not by username]
              Scrapes and adds to public groups
              Works in Windows systems
              You can run unlimited accounts at the same time in order to add members
              CSV files auto-distributer based on number of accounts to use
              Powerful scraping tool that can scrape active members from any public group
              You can add members both by username and by user ID
              Least chances of account ban
              Script auto-joins public group from all accounts for faster adding
              Filters banned accounts and remove them, making things easy
              Genisys can also store unlimited accounts for adding purposes
              Adding scripts launches automatically based on the number of accounts to use

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. BloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4jdatabase fed by a PowerShell ingestor.
          BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment.
          Changelog v4.0.2
              This release comes with a whole heap of bugfixes.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Wi-Fi Password Hacking
              Get Wi-Fi User All Password
              Wi-Fi Attack
              Wi-Fi Security
              Basic computer and Internet browsing knowledge...
              Operating System: Windows / OS X / Linux...
          Welcome to Wireless world!
          Wi-Fi is a wireless networking technology that uses radio waves to provide wireless high-speed Internet access. ... It specifically defines Wi-Fi as any “wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards
          Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorized access to or control over computer network security systems for some illicit purpose. Description: To better describe hacking, one needs to first understand hackers.
          Wireless hacking can be defined as an attack on wireless networks or access points that offer confidential information such as authentication attacks, wifi passwords, admin portal access, and other similar data. Wireless hacking is performed for gaining unauthorized access to a private wifi network.
          The demand for Certified Ethical Hackers, Cyber Security Engineers, Administrators, Consultants, Architects, Business Analysts, Project Managers, etc. is immense. The Certified Ethical Hacker certification is an attainable path to helping business protect their digital assets in the cloud and on-premise. You can do it!
          After the successful completion of this course you will be able to:
              Wireless Packet Types
              Analyzing Packet Types with Wireshark
              Deauthentication Attack with Bettercap
              Fake Authentication Attack
              Evil Twin Attack
              Cracking WPA/WPA2 with Aircrack-ng
              Dictionary Attack
              WPS PIN Attacks
              John The Ripper, Cowpatty, Wifite 2, and more

          Thanks for everyOne! I hope you enjoy this course. If face any problem, note this, then message me, I will solve your problem, as soon as possible.
          Who this course is for:
              Wi-Fi Hacker
              Wi-Fi Security
              Ethical Hacker
              Cyber Security
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. The all-in-one Red Team browser extension for Web Pentesters
          HackTools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells and much more.
          With the extension you no longer need to search for payloads in different websites or in your local storage space, most of the tools are accessible in one click. HackTools is accessible either in pop up mode or in a whole tab in the Devtools part of the browser with F12.
          Current functions:
              Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat)
              Shell Spawning (TTY Shell Spawning)
              XSS Payloads
              Basic SQLi payloads
              Local file inclusion payloads (LFI)
              Base64 Encoder / Decoder
              Hash Generator (MD5, SHA1, SHA256, SHA512)
              Useful Linux commands (Port Forwarding, SUID)
          Changelog v0.3.3
              Adding persistence on the app (When you close the app it will now open at the same place)
              URL Decoder

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Legal Disclaimer
          Usage of CDK for attacking targets without prior mutual consent is illegal. CDK is for security testing purposes only.
          CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency. It comes with useful net-tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
          Currently still under development, submit issues or mail [email protected] if you need any help.

          Hidden Content
          Give reaction to this post to see the hidden content.