Add AutoWIFI - Wireless Pentest Framework#198
Add AutoWIFI - Wireless Pentest Framework#198momenbasel wants to merge 2 commits intoHack-with-Github:masterfrom
Conversation
keyFinder is a Chrome extension (Manifest V3, MIT license) that passively detects leaked API keys, tokens, and secrets on any web page using 80+ regex patterns and Shannon entropy analysis. https://github.com/momenbasel/keyFinder
AutoWIFI is a wireless penetration testing framework that automates the full wireless attack chain including WEP/WPA/WPA2/WPS attacks with support for multiple cracking backends (aircrack-ng, hashcat, John).
There was a problem hiding this comment.
Pull request overview
Updates the “Other Useful Repositories” list in README.md by adding new security-related repository entries.
Changes:
- Add AutoWIFI to the “Other Useful Repositories” table.
- Add keyFinder to the same table (not mentioned in the PR description/title).
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| [Infosec Getting Started](https://github.com/gradiuscypher/infosec_getting_started) | A collection of resources, documentation, links, etc to help people learn about Infosec | ||
| [Infosec Reference](https://github.com/rmusser01/Infosec_Reference) | Information Security Reference That Doesn't Suck | ||
| [IOC](https://github.com/sroberts/awesome-iocs) | Collection of sources of indicators of compromise | ||
| [keyFinder](https://github.com/momenbasel/keyFinder) | Chrome extension that passively scans web pages for exposed API keys, tokens, and secrets using 80+ regex patterns and Shannon entropy |
There was a problem hiding this comment.
The PR title/description says it only adds AutoWIFI, but this change also adds a new entry for keyFinder. Either update the PR description/title to include this additional repository, or remove this line to keep the PR scoped to AutoWIFI.
| [AI Security](https://github.com/RandomAdversary/Awesome-AI-Security) | Curated list of AI security resources | ||
| [API Security Checklist](https://github.com/shieldfy/API-Security-Checklist) | Checklist of the most important security countermeasures when designing, testing, and releasing your API | ||
| [APT Notes](https://github.com/kbandla/APTnotes) | Various public documents, whitepapers and articles about APT campaigns | ||
| [AutoWIFI](https://github.com/momenbasel/AutoWIFI) | Wireless pentest framework automating WEP/WPA/WPA2/WPS attacks with multiple cracking backends (aircrack-ng, hashcat, John) |
There was a problem hiding this comment.
The AutoWIFI description lists "John" as a cracking backend, which is ambiguous/incomplete compared to the PR description ("John the Ripper"). Consider using the full tool name for clarity and consistency.
Summary
pip install autowifi