Michele M Jordan

A nifty tool to use when looking to discover access points and save captured traffic. Comes with a configure script and supports Cisco Aironet and random prism2 based cards. Kudos to AC for the USR card.

Category Wireless Tools
ModifiedNever

MacStumbler is a utility to display information about nearby 802.11b and 802.11g wireless access points. It is mainly designed to be a tool to help find access points while traveling, or to diagnose wireless network problems. Additionally, MacStumbler can ...

Category Wireless Tools
ModifiedNever

wavemon is a ncurses-based monitoring application for wireless network devices. It currently works under Linux with devices that are supported by the wireless extensions by Jean Tourrilhes (included in Kernel 2.4 and higher), e.g. the Lucent Orinoco cards ...

Category Wireless Tools
ModifiedNever

Prismstumbler is a wireless LAN (WLAN) which scans for beaconframes from accesspoints. Prismstumbler operates by constantly switching channels an monitors any frames recived on the currently selected channel.

Category Wireless Tools
ModifiedNever

AirTraf is a package with many features. It is enabled to operate as a standard real-time data gathering tool for solving location specific problems, as well as operating as a long-term data gathering tool for your wireless networked organization.

Category Wireless Tools
ModifiedNever
Freeware
Pricing Model

Mognet is a free, open source wireless ethernet sniffer/analyzer written in Java. Currently being rewritten in C++

Category Wireless Tools
Modified
Commercial
Pricing Model

The AirMagnet Handheld Analyzer represents a new generation of wireless network administration and diagnostic tools. Built from the ground up to help network professionals administer and troubleshoot 802.11 and 802.1x standards-based WLANs, it provides a ...

Category Wireless Tools
Modified
AirDefense, Inc

AirJack is a device driver (or suit of device drivers) for 802.11(a/b/g) raw frame injection and reception. It is meant as a development tool for all manor of 802.11 applications that need to access the raw protocol.ement frames.

Category Wireless Tools
ModifiedNever
AirDefense, Inc

AirDefense Mobile? is a complementary solution to the AirDefense Enterprise monitoring platform, giving enterprises an AirDefense-powered mobile product to perform a real-time snapshot of all WLAN infrastructure and activity (802.11 a/b/g). This must-have ...

Category Wireless Tools
ModifiedNever

Just an another passive 802.11b scanner

Category Wireless Tools
ModifiedNever

WLAN Expert is a wireless client utility designed to work with the PRISM chipset by Intersil. The Linksys WPC11 is the only client card I've tested, although many manufacturers use this silicon. Intersil counts Alcatel, Cisco, Compaq, Nokia, Nortel, Samsu ...

Category Wireless Tools
ModifiedNever

The gun, which is called the BlueSniper rifle, can scan and attack Bluetooth devices from more than a mile away.

Modified
Pentest Limited
Freeware
Pricing Model

btscanner 2.0 is a completely revamped version of the original. With all the features of 1.0, version 2.0 now boasts the ability to do brute force scans of OUI ranges. Both inquiry and brute force scan types are able to utilise multiple dongles to increas ...

Modified
code bluetest.pl

Modified
Ollie Whitehouse
Open Source
Pricing Model

Redfang  is a small proof-of-concept application to find non-discoverable Bluetooth devices by brute-forcing the last six bytes of the device's Bluetooth address and doing a read_remote_name(). This new version has streamlined code, enumerates servic ...

Modified
code bt_audit

small bluetooth audit suit containing psm_scan, rfcomm_scan and a script for generating database entries for btdsd

Modified

BlueSpam searches for all discoverable bluetooth devices and sends a file to them (spams them) if they support OBEX. By default a small text will be send. To customize the message that should be send you need a palm with an SD/MMC card, then you create th ...

Modified
Collin Mulliner and Martin Herfurt

Blueprinting is a method to remotely find out details about bluetooth-enabled devices. Blueprinting can be used for generating statistics about manufacturers and models and to find out whether there are devices in range that have issues with Bluetooth sec ...

Modified
trifinite.group
Freeware
Pricing Model

Blooover II is the successor of the very popular application Blooover. After 150000 downloads of Blooover, a new version of this mobile phone auditing toool is on its ready. Besides the BlueBug attack, Blooover II supports the HeloMoto attack (which is qu ...

Modified
Blooover II
Martin Herfurt

The carwhisperer project intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.

Modified