• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

WifiZoo v1.2 – Gather Wifi Information Passively

November 12, 2007

Views: 19,237

[ad]

WifiZoo is a tool to gather wifi information passively. Similar to dsniff but for wireless work, the author wanted to do something wifi-related somewhat helpful in wifi pentesting. Something of an extension of Ferret from Errata.

It’s essentially a tool to get information from open wifi networks without joining any network, and covering all wifi channels. Most of the packet parsing is done by Scapy.

WifiZoo does the following:

  • Gathers bssid->ssid information from beacons and probe responses
  • Gathers list of unique SSIDS found on probe requests
  • Gathers the list and graphs which SSIDS are being probed from what sources
  • Gathers bssid->clients information and outputs it in a file
  • Gathers ‘useful’ information from unencrypted wifi traffic (like passwords/credentials etc)

Requirements

  • Python
  • Scapy
  • Kismet (if you want to do channel hopping)
  • Logs are stored in ./logs/ (so make the directory)

You can download WifiZoo here:

wifizoo_v1.2.tgz

Or you can read more here.

Related Posts:

  • dsniff Download - Tools for Network Auditing &…
  • Autoswagger - Automated discovery and testing of…
  • Reaver Download - Hack WPS Pin WiFi Networks
  • An Introduction To Web Application Security Systems
  • XRayC2 - Weaponizing AWS X-Ray for Covert Command…
  • mcp-scan - Real-Time Guardrail Monitoring and…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking Tools, Networking Hacking Tools, Wireless Hacking Tagged With: hacking wifi, hacking-wireless, Network Hacking, wifi-hacking, Wireless Hacking, wireless-cracking



Reader Interactions

Comments

  1. Pantagruel says

    November 12, 2007 at 12:16 pm

    A very nice addition to the wireless tool set indeed.
    Works quite well in our secured environment, at home I honestly do not need to bother. A multitude of open access points simply because users where never told about the options to secure their wireless gear.

  2. Reticent says

    November 12, 2007 at 10:12 pm

    I was about to ask what this tool had over the aircrack-ng suite of applications until I saw the passwords/credential gathering feature. You really have to feel for people still running unencrypted wireless points!

  3. normalsecrecy says

    November 13, 2007 at 7:24 am

    this will be a nice complement to other tools. it’ll be interesting just to see how many passwords can be snooped.

  4. Goodpeople says

    November 13, 2007 at 9:52 pm

    It would be even nicer if it could automatically crack WEP and WPA, but I understand that that’s in the works.

    I particulary like the ability to make a graph of the network. That could prove to be a very usefull feature.

    Keep up te good work!

  5. dirty says

    November 16, 2007 at 10:58 pm

    The web interface is a nice feature.

    Darknet BTW – the download link provide is wrong you have v1.1
    http://community.corest.com/~hochoa/wifizoo/wifizoo_v1.2.tgz

  6. Sir Henry says

    December 15, 2007 at 3:38 am

    I have been looking at scapy for a little while now to assist me in developing a hacktool in Python. Scapy is brilliant in its construction and function. This tool, however, looks like it would be pretty useful while mapping APs.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,168

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,036

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,333

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,187

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,186

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,082

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,431,635)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,096)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,549)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,346)
  • Password List Download Best Word List – Most Common Passwords (934,662)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,384)
  • Hack Tools/Exploits (674,308)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,421)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy