• WIFI master key (except advertising display password version)

    This version thanks to God [YYY] for modification and sharing. The specific features are as follows: ◎ Based on the latest domestic version (theoretical support for Android P) ◎ Replace the package name, do not update, do not roll over, stable and easy to use ◎ The new password will be displayed in color below the hotspot ◎ Intelligent password display, blank password and copy button will not be displayed when no password is obtained ◎ Remove nearly 98% of redundant code&layout&advertising&permission ◎ Brand new interface, retaining the top bar, switch and portable Wifi button ◎ The built-in browser is removed, and the connection is successful without jumping ◎ Removing obstacles read the whole passage
    Author: qxz_xp | Published: August 29, 2018 | Classification: Hacker Tools , Hacker attack and defense | 12 comments
  • Teach you how to crack the Wi Fi password of the girl next door

    The best neighbor is a good person who does not have a Wi Fi password. However, the neighborhood relationship is so indifferent now that the password always blocks the door when you want to rub a Wi Fi. Without a good neighbor in China to provide a Wi Fi password, we will take the initiative to rub! Today, Hard Chuangbang will dedicate a method to capture Wi Fi passwords. At present, the common Wi Fi encryption methods are WEP WPA2 and WPS (links are their own cracking methods). However, some netizens reported that the previous methods to crack WPA2 took too long and were not applicable to all WPS enabled access points. And today we introduce read the whole passage
    Author: qxz_xp | Published: October 17, 2015 | Classification: Hacker technology , Hacker attack and defense | 11 comments
  • Seven reasons for blacking you

    Common sense tells us that users are the weakest link in IT risk management, especially for some "naive and brave" users... But how did hackers use this naivety (lack of protection awareness) to enter user terminals and company accounts? Many of the methods they used involved some psychological tricks, so most of the attacks involved phishing and social engineering. Here are seven reasons why users should be hacked: 1、 Automatic hook up Because of its effectiveness, great influence and simplicity, phishing has always been read the whole passage
    Author: qxz_xp | Published: April 21, 2015 | Classification: Hacker technology , Hacker attack and defense | No comment
  • Fishing Wi Fi and sniffing test tool 3vilTwinAttacker

    Disclaimer: The security tools and procedures (methods) provided by this website may be offensive, and they are only used for security research and teaching at your own risk! 3vilTwinAttacker can help penetration testers build a fake phishing WiFi. On the surface, this is a normal AP (network access point) that provides online services, but in fact it is imperceptibly sniffing for network traffic. Software dependencies Kali linux is recommended Ettercap Sslstrip Airbase ng (included in airfrack ng) DHCP Nmap DHCP Installation (Debian) read the whole passage
    Author: qxz_xp | Published: March 24, 2015 | Classification: Hacker Tools , Hacker attack and defense | 1 comment
  • Bypass WiFi Verification: Four Tips for Free WiFi Use

    Nowadays, more and more shopping malls, coffee shops, restaurants and other public places provide open WiFi networks. But sometimes even if our device is connected to WiFi, when we open a webpage, an authentication page will pop up immediately... Is it very depressing? This Spring Festival, I will share with you several ways to bypass common WiFi authentication. I wish you a happy New Year. For entertainment only, please obey the rules and regulations, and don't be beaten by the boss^_^ WiFi requiring identity authentication This is an open WiFi network. Before actually using the network read the whole passage
    Author: qxz_xp | Published: February 20, 2015 | Classification: Hacker technology , Hacker attack and defense | 2 comments
  • WiFi security test tool, WiFiPhisher

    Disclaimer: The security tools and procedures (methods) provided by this website may be offensive, and they are only used for security research and teaching at your own risk! Greek security researcher George Chatzisofroniou has developed a WiFi security testing tool called WiFiPhisher. Although there are many tools on the Internet that can crack the wireless network, WiFiPhisher is different from it. It does not need to use brute force attack to obtain the user's wireless WiFi password. If you are interested, you can download it on GitHub for free. WiFiPhisher principle 1.... read the whole passage
    Author: qxz_xp | Published: January 7, 2015 | Classification: Hacker Tools , Hacker attack and defense | 3 comments