snappy

Snap.py - (Snap)shot SHA256 hashes of wireless access points to determine whether something has changed since your last visit (e.g. rogue AP), plus detect airbase-ng in use. Feed it .pcap/.cap file for offline mode or change ‘sniff’ to an interface to run live. e.g. ./snap.py goodness.cap

download: https://tomneaves.com/tools/snap.py
relevant research: https://tomneaves.com/2023/08/27/snappy-detecting-rogue-and-fake-80211-wireless-access-points-through-beacon-management-frames/

====

masher

Masher – a helper/tool to help identify creative (non-standard) password hashing in use.

download: https://tomneaves.com/tools/masher.py
relevant research: https://tomneaves.com/2021/03/25/from-creative-password-hashes-to-administrator-in-60-seconds/

====

smuggler

Smuggler - A two-way covert communications channel, which consists of an interactive wireless shell without the need for association or authentication.

download: not released
relevant research: https://tomneaves.com/2014/11/03/smuggler-an-interactive-80211-wireless-shell-without-the-need-for-authentication-or-association/

====

cookie monster

Cookie Monster (from way back in 2010) will grab cookies from a host and assign each character a number. This number can then be used to perform mathematical calculations on the differences in order to find a pattern and see if cookie prediction is possible. Pretty graphs generated.

download: https://tomneaves.com/tools/cookiemonster.py