Offensive Wireless's Projects
Radio Signals Recognition Manual
Explore the realm of Bluetooth Penetration Testing through our comprehensive website. Learn about different techniques, tools, and best practices used to expose vulnerabilities and improve the security of Bluetooth technologies. Stay up-to-date with latest trends and advancements in the field of Bluetooth security testing.
BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework
Crack and decrypt BLE encryption
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
Exploring possibilities of ESP32 platform to attack on nearby Wi-Fi networks.
Evil Crow RF device.
This firmware is an alternative to the EvilCrowRF default firmware.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
evilginx2 + gophish
a collection of boards ive designed for the Flipper zero. more are on their way!
OffensivePI
Gnuradio blocks and tools for receiving GSM transmissions
GNU Radio LTE receiver
This program capture SMS & IMSI numbers of cellphones around you.
SensePost's modified hostapd for wifi attacks.
This program show you IMSI numbers of cellphones around you.
Plugin for Kismet to detect and highlight IoD devices
JackIt - Exploit Code for Mousejack
IEEE 802.15.4/ZigBee Security Research Toolkit
Github mirror of official Kismet repository
Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.
A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
MouseJack device discovery and research tools
Backdoor Ducky Script using MouseJack exploit and JackIt exploit code