Skip to content

Add AutoWIFI - Wireless Pentest Framework#198

Open
momenbasel wants to merge 2 commits intoHack-with-Github:masterfrom
momenbasel:add-autowifi
Open

Add AutoWIFI - Wireless Pentest Framework#198
momenbasel wants to merge 2 commits intoHack-with-Github:masterfrom
momenbasel:add-autowifi

Conversation

@momenbasel
Copy link
Copy Markdown

Summary

  • Adds AutoWIFI to the Other Useful Repositories section in alphabetical order
  • AutoWIFI is a Python wireless penetration testing framework (GPL-3.0) that automates the full wireless attack chain
  • Supports WEP/WPA/WPA2/WPS attacks with multiple cracking backends (aircrack-ng, hashcat, John the Ripper), session management, and report generation
  • Installable via pip install autowifi

keyFinder is a Chrome extension (Manifest V3, MIT license) that
passively detects leaked API keys, tokens, and secrets on any web
page using 80+ regex patterns and Shannon entropy analysis.

https://github.com/momenbasel/keyFinder
AutoWIFI is a wireless penetration testing framework that automates
the full wireless attack chain including WEP/WPA/WPA2/WPS attacks
with support for multiple cracking backends (aircrack-ng, hashcat, John).
Copilot AI review requested due to automatic review settings April 8, 2026 21:59
Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the “Other Useful Repositories” list in README.md by adding new security-related repository entries.

Changes:

  • Add AutoWIFI to the “Other Useful Repositories” table.
  • Add keyFinder to the same table (not mentioned in the PR description/title).

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment thread README.md
[Infosec Getting Started](https://github.com/gradiuscypher/infosec_getting_started) | A collection of resources, documentation, links, etc to help people learn about Infosec
[Infosec Reference](https://github.com/rmusser01/Infosec_Reference) | Information Security Reference That Doesn't Suck
[IOC](https://github.com/sroberts/awesome-iocs) | Collection of sources of indicators of compromise
[keyFinder](https://github.com/momenbasel/keyFinder) | Chrome extension that passively scans web pages for exposed API keys, tokens, and secrets using 80+ regex patterns and Shannon entropy
Copy link

Copilot AI Apr 8, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The PR title/description says it only adds AutoWIFI, but this change also adds a new entry for keyFinder. Either update the PR description/title to include this additional repository, or remove this line to keep the PR scoped to AutoWIFI.

Copilot uses AI. Check for mistakes.
Comment thread README.md
[AI Security](https://github.com/RandomAdversary/Awesome-AI-Security) | Curated list of AI security resources
[API Security Checklist](https://github.com/shieldfy/API-Security-Checklist) | Checklist of the most important security countermeasures when designing, testing, and releasing your API
[APT Notes](https://github.com/kbandla/APTnotes) | Various public documents, whitepapers and articles about APT campaigns
[AutoWIFI](https://github.com/momenbasel/AutoWIFI) | Wireless pentest framework automating WEP/WPA/WPA2/WPS attacks with multiple cracking backends (aircrack-ng, hashcat, John)
Copy link

Copilot AI Apr 8, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The AutoWIFI description lists "John" as a cracking backend, which is ambiguous/incomplete compared to the PR description ("John the Ripper"). Consider using the full tool name for clarity and consistency.

Copilot uses AI. Check for mistakes.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants