Commit b5514cb2 authored by Re4son's avatar Re4son
Browse files

Initial commit


Signed-off-by: Re4son's avatarRe4son <3520622-re4son@users.noreply.gitlab.com>
parents
/config.py
/unsigned/
/repo/
/archive/
/logs/
/tmp/
/builder/
*~
*.swp
*.swo
*.pyc
.fdroid*
*.apk
*.jks
/metadata/dump_*
/stats/logs/
/stats/data/
/build/*/
!/build/extlib/
/build/.fdroidvcs-*
/stats/publishsigkeys.jar
# used in fdroidserver's ./jenkins-test
keystore.jks
AuthorName: 'team@walrus.app'
Categories:
- RF
CurrentVersionCode: 4
CurrentVersion: '0.2.1'
IssueTracker: ''
Name: Walrus
SourceCode: 'https://github.com/TeamWalrus/Walrus'
License: 'GPL-3.0'
WebSite: 'https://walrus.app/'
Use your existing contactless card cloning devices with your Android device
Add Mifare 1k support for Proxmark
Add manual card entry support for HID cards
Add detailed view for HID card data
Allow manual editing of HID card data
Decoding of HID card data
Better device support for Proxmark including RDV4
Walrus enables you to use your existing contactless card cloning devices with your Android device. Using a simple interface, cards can be read into a wallet to be written or emulated later.
Designed for physical security assessors, Walrus has features that will help you in your next red team engagement. Bulk card reading lets you easily capture multiple cards as you move around your target location, while simultaneous device reading lets you use different devices to read multiple card types all at once.
Walrus currently supports the Proxmark3 and the Chameleon Mini, with more device support on the way.
NOTE: Walrus requires the use of one of the supported devices; it cannot read or write cards directly through your Android device.
Use your existing contactless card cloning devices with your Android device
AuthorName: 'Christos Kyriakopoulos'
Categories:
- WiFi
CurrentVersionCode: 32
CurrentVersion: "1.5-beta.8"
IssueTracker: 'https://github.com/chrisk44/Hijacker/issues'
Name: Hijacker
SourceCode: 'https://github.com/chrisk44/Hijacker'
WebSite: 'https://github.com/chrisk44/Hijacker'
RequiresRoot: 'Yes'
All-in-one WiFi cracking tools
Add optional client count label next to AP tile icons
Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses.
This application requires an ARM android device with an internal wireless adapter that supports Monitor Mode. A few android devices do, but none of them natively. This means that you will need a custom firmware. Any device that uses the BCM4339 chipset (MSM8974, such as Nexus 5, Xperia Z1/Z2, LG G2, LG G Flex, Samsung Galaxy Note 3) will work with Nexmon (which also supports some other chipsets). Devices that use BCM4330 can use bcmon.
An alternative would be to use an external adapter that supports monitor mode in Android with an OTG cable.
The required tools are included for armv7l and aarch64 devices as of version 1.1. The Nexmon driver and management utility for BCM4339 and BCM4358 are also included.
Root access is also necessary, as these tools need root to work.
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment