#Armory The 802.11 Hacking Repo.
##Books:
- CWSP
- WiFi Toys
- CUDA By example
- Hacking Wireless Networks
- Professional CUDA C Programming
- Practical antenna handbook 4th ED.
##Papers
- WPA Too!
- WPA Migration Mode
- known wireless attacks
- backtrack-4-cuda-guide
- Phishing in the Wireless
- 802.11b Firmware-Level Attacks
- RF Basics for Non-RF engineers
- The Art of casual WiFi hacking
- Channel Switch and Quiet attack
- AirPTWFrag: A New Wireless Attack
- Breaking Encryptions In The Cloud
- Malware Injection in Wireless Networks
- 802.11 Jamming Using Consumer WiFi Cards
- Pwned Extensible Authentication Protocol
- WLAN Steganography: A First Practical Review
- Steganography in IEEE 802.11 OFDM symbols
- Using Wireless Signals to Locate a Target
- Practical Covert Channels for WiFi Systems
- A Heterogeneous Cluster with FPGAs and GPUs
- Null Data Frames in IEEE 802.11 based WLANs
- Cracking AT&T U-verse Default WPA2 Keys (pptx)
- Vulnerabilities of Wireless Security protocols
- U.S. Government 802.11 WIPS Profile Protection
- A Study of Jamming Attacks in IEEE 802.11 Networks
- Hiding Data in OFDM Symbols of IEEE 802.11 Networks
- Exposing WPA2 security protocol vulnerabilities
- A Practical Message Falsification Attack on WPA
- Virtual WLAN: Going beyond Virtual Access Points
- Offline bruteforce attack on WiFi Protected Setup
- Injection Attacks on 802.11n MAC Frame Aggregation
- A DCF-Based Covert Timing Channel In 802.11 Networks
- Stealthy MITM Attack in WPA2 Encrypted Wi-Fi Networks
- WPA password cracking Parallel Processing on the Cell BE
- An FPGA architecture for the recovery of WPA/WPA2 keys
- Implementation of a Covert Channel in the 802.11 Header
- ARUBA NETWORKS GOVERNMENT SOLUTIONS GUIDE
- Exploiting WPA2-Enterprise through Challenge Response Oracles
- Abusing the Windows WiFi native API to create a Covert Channel
- A Practical Approach to Distributed WPA/WPA2 Cracking with CUDA
- A Targeted, Stealthy Attack Against WPA Enterprise Authentication
- WPA/WPA2 Password Security Testing using Graphics Processing Units
- Realizing an 802.11-based Covert Timing Channel Using Off-The-Shelf Wireless Cards
- NSA Guidelines for the Development/Evaluation of IEEE 802.11 Intrusion Detection Systems
- NSA Commercial Solutions for Classified Campus IEEE 802.11 Wireless Local Area Networks
##Tells:
##Videos:
- wi-door
- WPA Too!
- Underground Wi Fi Hacking for Web Pentesters
- Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
##Courses:
##Posts:
##Wordlists:
- NETGEARXX
- rockyou.txt
- UniqPassv14
- PsycOPacKv2
- g0tmi1k Edition
- Full 18in1 cleaned List | password: maurisdump.blogspot.com
- TP-LINK_XXXXXX (WEP Keys)
- TP-LINK_XXXXXX (WPA/WPA2 Keys)
- CrackStation's Password Cracking Dictionary
##Tools:
- mana
- bully
- WPSIG
- kismet
- cpscam
- asleap
- eapeak
- wifuzz
- mdk3-v6
- wi-door
- coWPAtty
- pixiewps
- wifuzzit
- 80211ping
- Peap-Karma
- reaver-wps
- eapmd5pass
- wps-scripts
- aircrack-ng
- hostapd-wpe
- aggr-inject
- wifi-arsenal
- dot11decrypt
- reaver-wps-fork-t6x
- TPLink-AttackDictionary-v1c.x
- Wireless eXfiltration Protocol library
##Websites:
##Wiki:
- Who is AMD ?
- What is WEP ?
- What is TKIP ?
- Who is Intel ?
- What is CUDA ?
- What is GPGPU ?
- What is a GPU ?
- What is a MAC ?
- Who is Nvidia ?
- What is a CPU ?
- What is OpenCL ?
- What is a WIPS ?
- What is PBKDF2 ?
- What is is CCMP ?
- What is 802.11a ?
- What is 802.11b ?
- What is 802.11g ?
- What is 802.11n ?
- What is 802.11ac ?
- What is WPA/WPA2 ?
- What is Wardriving ?
- What is FreeRADIUS ?
- List of WLAN Channels
- What is Piggybacking ?
- What is an Evil Twin ?
- What is the ISM Band ?
- Who is Aruba Networks ?
- What is the OSI Model ?
- Who is the Wi-Fi Alliance ?
- What is a Wireless router ?
- What is a Rogue access point ?
- The Cracking of wireless networks
- What is the IEEE 802.11 Specification?
#Donations:
- 17vorVqtJqbDaN6ZC6UGE7UwGC4QVmDNMh