/fun-scripts

Automatically exported from code.google.com/p/fun-scripts

Primary LanguagePython

➜ SVN tree -r fun-scripts

├── WiFI_Check_SSID_like_PASS

│ └── sud0.check_SSID_PASS.py => to check WiFI AP with WPA passphrase equal to SSID

├── WiFI_Aircrack_Help?

│ ├── sud0.WPA.sh => tutorial to know which commands to launch to crack WEP

│ ├── sud0.WEP_SKA.sh => tutorial to know which commands to launch to crack WEP (SKA)

│ └── sud0.WEP_OPN.sh => tutorial to know which commands to launch to crack WPA

└── RAM_exploit

├── sud0.RAM_Web_Cred?-0.1.py => to identity Web password into RAM image ├── sud0.RAM_MacOSx_Cred-0.1.py => to identity MAC OS X system password into RAM image └── sud0.MemDump?.py => to dump RAM by DMA access (target is Mac OS X) 3 directories, 7 files