Books & Manuals

Top Resources

  1. How to Improve Success with Reaver Using MAC Addresses
    How to cut down a WPS attack from 10 hours to 5 minutes - by Mr. Penguin
    Updated: 31 Aug 2014
  2. ebooklab
    learn the basics of pentesting - by Fantastic
    Updated: 14 Apr 2013
  3. Computer Hacking Forensics Investigator
    Official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide - by Mr. Penguin
    Updated: 11 Apr 2013
  4. TP-Link TD-W89 Exploitation
    This is a whitepaper that goes into detail on downloading configuration files and exploiting - by Mr. Penguin
    Updated: 29 Aug 2014
  5. Sky Broadband Router SR101 Weak WPA-PSK Generation Algorithm
    Vulnerable to an offline dictionary attack if the WPA-PSK handshake is obtained by an attacker - by Mr. Penguin
    Updated: 29 Aug 2014
  1. Mr. Penguin

    How to Improve Success with Reaver Using MAC Addresses

    How to cut down a WPS attack from 10 hours to 5 minutes
    4/5, 4 ratings
    Updated:
    31 Aug 2014
  2. Mr. Penguin

    TP-Link TD-W89 Exploitation 1

    This is a whitepaper that goes into detail on downloading configuration files and exploiting
    0/5, 0 ratings
    Downloads:
    118
    Updated:
    29 Aug 2014
  3. Mr. Penguin

    Sky Broadband Router SR101 Weak WPA-PSK Generation Algorithm

    Vulnerable to an offline dictionary attack if the WPA-PSK handshake is obtained by an attacker
    0/5, 0 ratings
    Updated:
    29 Aug 2014
  4. Mr. Penguin

    Tenda A5s Router Authentication Bypass

    Suffers from an authentication bypass vulnerability due to improperly trusting cookies
    0/5, 0 ratings
    Updated:
    29 Aug 2014
  5. Mr. Penguin

    Ubiquiti UbiFi Controller 2.4.5 Password Hash Disclosure

    Ubiquiti UniFi Controller version 2.4.6 discloses the administrative password hash via syslog messag
    0/5, 0 ratings
    Updated:
    3 Aug 2014
  6. Mr. Penguin

    DIR-605L Disclosure / Bypass

    DIR-605L suffers from password disclosure and authentication bypass vulnerabilities
    0/5, 0 ratings
    Updated:
    16 Jun 2014
  7. Mr. Penguin

    Default WPA key generator for Sitecom WLR-4000/4004 routers 1.0

    Sitecom WLR-4000 and WLR-4004 both v1 001 suffer from weak firmware encryption and key
    0/5, 0 ratings
    Downloads:
    127
    Updated:
    25 Apr 2014
  8. Mr. Penguin

    Wifi Packet Capturing / Session Hijacking Using Wireshark 2014-04-25

    Details how to perform wifi man in the middle attacks and then sniff the traffic for analysis
    0/5, 0 ratings
    Downloads:
    353
    Updated:
    25 Apr 2014
  9. Mr. Penguin

    Cisco RV110W / RV215W / CVR100W Login Bypass 2014-04-16

    RV110W, RV215W, and CVR100W suffer from a login bypass vulnerability
    0/5, 0 ratings
    Downloads:
    58
    Updated:
    16 Apr 2014
  10. Mr. Penguin

    Pirelli Discus DRG A125g Remote Wifi Password Change 2013/11/23

    Pirelli Discus DRG A125g suffers from a remote wifi password change vulnerability.
    0/5, 0 ratings
    Downloads:
    25
    Updated:
    21 Dec 2013
  11. khackerupp

    CISCO & CEH MINMAP 2013-10-24

    The summary of cisco, cissp, ceh,...in mindmap which is easier for reading and understanding
    0/5, 0 ratings
    Downloads:
    99
    Updated:
    27 Oct 2013
  12. Mr. Penguin

    Hacking IPv6 Networks BRUCON 2012

    These are the slides for the "Hacking IPv6 Networks" security training course
    0/5, 0 ratings
    Downloads:
    236
    Updated:
    29 Apr 2013
  13. Fantastic

    ebooklab v2.0

    learn the basics of pentesting
    4.5/5, 2 ratings
    Downloads:
    427
    Updated:
    14 Apr 2013
  14. Mr. Penguin

    Computer Hacking Forensics Investigator 2

    Official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide
    3.5/5, 2 ratings
    Downloads:
    361
    Updated:
    11 Apr 2013
  15. ImJoJo

    Google Hacking for Penetration Testers Volume 1

    Explore the Dark Side of Googling
    0/5, 0 ratings
    Downloads:
    298
    Updated:
    6 Apr 2013
  16. ImJoJo

    Google Hacking for Penetration Testers Volume 2

    Explore the Dark Side of Googling
    0/5, 0 ratings
    Downloads:
    243
    Updated:
    6 Apr 2013
  17. Fantastic

    Certified Ethical Hacking: 0.0

    learn basics of ethical hacking
    0/5, 0 ratings
    Downloads:
    368
    Updated:
    3 Apr 2013
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K