EmuMaster

This is the latest unofficial BETA of EmuMaster 0.4.0 dated September 2012. It was never released to public and was available only to beta testers. Latest official stable release is still 0.3.0, though it contains numerous bugs.

No official changelog were present, but by the looks of it:

  • Sound engine was improved considerably.
  • PSX engine was rewritten.

Fixed version contains several improvements over original beta version:

kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT.
 

Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic.

r-base

Standard recompilation of r base package from CRAN for Harmattan.

R statistical software is (C) R Foundation, from http://www.r-project.org.

 

isc-dhclient

macchanger

GNU/Linux utility for viewing/manipulating the MAC address of network interfaces

pyrit

Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff.

cowpatty

coWPAtty is designed to audit the security of pre-shared keys selected in WiFi Protected Access (WPA) networks.

reaver

Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.

wireless-tools

aircrack-ng

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools.

Pages

Subscribe to OpenRepos.net — Community Repository System RSS