Skip to content

sahullander/WirelessResearch

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

56 Commits
 
 
 
 
 
 
 
 

Repository files navigation

🌐 Wireless Security and Research Repository

Welcome to the Wireless Security and Research Repository! This repository aims to provide a comprehensive collection of resources, information, and tools related to wireless protocols, their security, and research. Whether you are a wireless security enthusiast, a penetration tester, or a researcher, this repository serves as a valuable source of knowledge and practical guidance. There is a lot to explore, so if this your first time here we highly recommend you checkout Getting Started. As an alternative, the Table of Contents section provides an outline for the entire repository!

🚀 Getting Started

The objectives of this repository are the following:

  • Educate: Learn about different wireless protocols, vulnerabilities, and how to perform wireless penetration tests.
  • Document: Find comprehensive documentation, guides, and tutorials on wireless security and pentesting techniques.
  • Create: Join the community and contribute your own tools, scripts, and methodologies to foster collaboration and innovation in wireless pentesting.

So, where should I start? We're glad you asked! The answer is.. it depends.

Below is a high-level description of each section of the repo that will help you make your decision on next steps.

📁 Protocols

The Protocols folder is the main hub for learning about different wireless protocols, vulnerabilities, and how to perform wireless penetration testing. Within this folder are subfolders for the different "groups" of wireless protocols, including Cellular, WiFi, Bluetooth, and IoT. Each of these "groups" have additional subfolders for specific wireless protocols. Within these sub-subfolders are where you will find details about that specific protocol, vulnerabilities, and a testing runbook that details how to exploit the protocol (if known). This structure can be seen in Table of Contents: Protocols.

📁 Methodology

The Methodology folder provides a structured methodology that can be useful when creating runbooks, conducting assessments, and reporting findings. This helps the assessment process become more organized, enabling testers to systematically identify vulnerabilities and generate comprehensive reports. More details on the contents of this folder can been found in Table of Contents: Methodology.

📁 Tools and Resources

Are you looking for additional resources for learning wireless pentesting? We compiled a list of Tools and Resources that can provide valuable insights, expand your knowledge, and facilitate further exploration of this dynamic field. This includes Hardware, Software, Books, Videos, and more. Additional details on the contents of this folder can been found in Table of Contents: Tools and Resources.

🔍 Table of Contents

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published