Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      wifipumpkin3 v1.0.9R2 - Powerful framework for rogue access point attack

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.

      Main Features

          Rogue access point attack
          Man-in-the-middle attack
          Rogue Dns Server
          Captive portal attack (captiveflask)
          Intercept, inspect, modify and replay web traffic
          WiFi networks scanning
          DNS monitoring service
          Credentials harvesting
          Transparent Proxies
          LLMNR, NBT-NS, and MDNS poisoner (Responder3)
          and more!

      Changelog v1.0.9R2

      Added

          added route for get information of plugins and proxies on restAPI
          added new attribute on plugins and proxies mode class
          added logger resource API
          added new command dhcpmode
          added option for settings dhcp mode pydhcpserver or dhcpd_server
          added new support to run isc_dhcp_server for dns/ dhcp
          added support kali linux iptables nf_tables set iptables_legacy as default #140
          added format 28 files reformatted black library

      Changed
      Deprecated
      Removed

          removed support to Rest API controller temporally

      Fixed

          fixed cli error when resquest restAPI plugins and proxies
          fixed restApi error when get exceptions http request
          fixed wirelesscontroller not started into restAPI mode
          fixed locale error in docker container
          fixed logical error dhcpd server implementation #158
          fixed logical error when try to get iptables path with nf_tables thanks @cjb900

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. --[ Mail Brutes Checker ]--
          --[   Auto Save Result  ]--
          --[ API 1 - API 2 -.etc ]--
          --[   FREE PROXY CPM++  ]--
          --[     TimeOut : 1     ]--
          --[  THREAD : 25 Good   ]--

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. In this Skillshare class, you will learn how to design & animate your first professional-quality animation in After Effects. Your project will be animating a logo reveal, with smooth shape-morphing, and polished compositing.
          I designed this course to teach you what you need to know to get started with After Effects in the industry of Motion Design.
          You’ll learn how to:
              Navigate and use the After Effects Interface
              Design and animate with shape layers & keyframes
              Improve your animation with the graph editor!
              Work more efficiently with precomposing & null objects
              Add polish and style with compositing effects
              Export your animation for easy sharing
          One of the most important things you’ll learn, is how to use THE GRAPH EDITOR to make your animation look professional and smooth, not beginner and stiff. It’s the first thing I look for when evaluating animation work from freelancers.
          We aren’t talking about VFX. We aren’t making crazy instagram videos. We are learning After Effects from the ground up with techniques and workflows I use every day in my job as a motion design director and animator.
          No prior experience with After Effects is necessary. If you’re looking to learn how to animate in After Effects, and a professional approach to a simple, yet polished animation, this is the class for you.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A small reverse shell for Linux & Windows.
          Features
          Windows
          Usage:
          └ Shared Commands:  !exit
            !upload <src> <dst>
             * uploads a file to the target
            !download <src> <dst>
             * downloads a file from the target
            !lfwd <localport> <remoteaddr> <remoteport>
             * local portforwarding (like ssh -L)
            !rfwd <remoteport> <localaddr> <localport>
             * remote portforwarding (like ssh -R)
            !lsfwd
             * lists active forwards
            !rmfwd <index>
             * removes forward by index
            !plugins
             * lists available plugins
            !plugin <plugin>
             * execute a plugin
            !spawn <port>
             * spawns another client on the specified port
            !shell
             * runs /bin/sh
            !runas <username> <password> <domain>
             * restart xc with the specified user
            !met <port>
             * connects to a x64/meterpreter/reverse_tcp listener
          └ OS Specific Commands:
            !powershell
              * starts powershell with AMSI Bypass
            !rc <port>
              * connects to a local bind shell and restarts this client over it
            !runasps <username> <password> <domain>
              * restart xc with the specified user using powershell
            !vulns
              * checks for common vulnerabilities
          Linux
          Usage:
          └ Shared Commands:  !exit
            !upload <src> <dst>
             * uploads a file to the target
            !download <src> <dst>
             * downloads a file from the target
            !lfwd <localport> <remoteaddr> <remoteport>
             * local portforwarding (like ssh -L)
            !rfwd <remoteport> <localaddr> <localport>
             * remote portforwarding (like ssh -R)
            !lsfwd
             * lists active forwards
            !rmfwd <index>
             * removes forward by index
            !plugins
             * lists available plugins
            !plugin <plugin>
             * execute a plugin
            !spawn <port>
             * spawns another client on the specified port
            !shell
             * runs /bin/sh
            !runas <username> <password> <domain>
             * restart xc with the specified user
            !met <port>
             * connects to a x64/meterpreter/reverse_tcp listener
          └ OS Specific Commands:
           !ssh <port>
             * starts sshd with the configured keys on the specified port

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A unique, multithreaded Low & Slow Denial-of-Service (Slow DoS) exploit against web servers that use vulnerable versions of thread-based web server software (Apache 1.x, Apache 2.x, httpd, etc.), that denies typical service to the web server’s legitimate clients by exhausting server resources at the cost of minimal bandwidth at the attacker's end — using a single system.
          This unique approach uses staggering amounts of concurrently generated HTTP GET requests even while the other sockets are being created and established on-the-go, and is ironically effective against even some of its typical mitigation mechanisms such as poorly implemented reverse proxy servers.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A high-speed & unique multithreaded dictionary attack implementation that attacks a supported hash with a "chunkified" user-defined dictionary file to find the string candidate that corresponds to the supplied hash.

          Hidden Content
          Give reaction to this post to see the hidden content.