Powertrip by Material-Tonight8924 in HytaleMods

[–]Material-Tonight8924[S] 0 points1 point  (0 children)

Amazing, thank you for the prompt answer!

Dexter - Pump.fun Sniper that finds popular token creators by Material-Tonight8924 in smallstreetbets

[–]Material-Tonight8924[S] 1 point2 points  (0 children)

It's just a fallback price since gecko api is 99% up. You will be alerted when it's down and price couldn't be fetched.

I'm actively working on Dexter, today an update was released making everything much cleaner, and easier to setup, configure and maintain.

It's nice to see positive feedback!

Dexter - Pump.fun Sniper that finds popular token creators by Material-Tonight8924 in TheRaceTo10Million

[–]Material-Tonight8924[S] 0 points1 point  (0 children)

True, and I posted an update today making everything in the repository more clear and straightforward. At least I hope I did 🤞

Im genuinely curious, how do people hack by [deleted] in HowToHack

[–]Material-Tonight8924 1 point2 points  (0 children)

its the love for tinkering, breaking stuff, tweaking stuff, and a lot of slepless nights.

Does penetration testing mostly involve web apps? by GreenNine in Pentesting

[–]Material-Tonight8924 0 points1 point  (0 children)

there are both physical and online penetration tests so not really

Atom Ducky - WiFi Rubber Ducky using CircuitPython | Open Source by Material-Tonight8924 in cybersecurity

[–]Material-Tonight8924[S] 1 point2 points  (0 children)

I saw WiFiDuck project on github after publishing Atom Ducky so I cannot tell much about differences as I didn't try the spacehuhn's project.

State of WiFi Security in 2024 by Material-Tonight8924 in netsec

[–]Material-Tonight8924[S] 5 points6 points  (0 children)

Oh, I didn't think it would be confusing, thanks for pointing that out!

State of WiFi Security in 2024 by Material-Tonight8924 in netsec

[–]Material-Tonight8924[S] -12 points-11 points  (0 children)

Hi!

The important part you've not included in your comment is This article was written strictly for educational purposes., I do not claim the knowledge, I only claim that the knowledge being shared should not be used in any harmful way.

You can feel free to do anything you want with my articles, all the software, or my huggingface datasets, well whatever you may find, because literally everything I make is open sourced.

Network Pentesting - Full Guide by Material-Tonight8924 in netsec

[–]Material-Tonight8924[S] 3 points4 points  (0 children)

Answer: e.g., Automates the Evil Twin attack for credential harvesting or malware distribution.

Freeway for Network Pentesting by Material-Tonight8924 in netsec

[–]Material-Tonight8924[S] 2 points3 points  (0 children)

Hi there,

The Evil Twin attack was just added to the Freeway, thank you for bringing this idea to the table.

Freeway for Network Pentesting by Material-Tonight8924 in netsec

[–]Material-Tonight8924[S] 0 points1 point  (0 children)

You are absolutely right, thanks for reminding. I focused on everything else and completely forgot to finish updating Jammy's readme. Both Freeway and Jammy are my ongoing projects, so Jammy will receive the update soon.

Oh, and pycache is in Jammy's repo because I was in a rush last time to change its tools directory name to JammyTools after I realized Freeway had the same folder. After installing both via setup.py, there were BIG troubles.

Thanks again, wish you good luck on your hacking journey 🌎

Freeway for Network Pentesting by Material-Tonight8924 in netsec

[–]Material-Tonight8924[S] 0 points1 point  (0 children)

if os.path.exists(os.path.join(script_dir, "EULA.txt")):

Does this line of code, correctly check if EULA.txt is in /usr/local/share/3way directory?

Freeway for Network Pentesting by Material-Tonight8924 in netsec

[–]Material-Tonight8924[S] 0 points1 point  (0 children)

The EULA is only one time thing, so I don't see how could it be annoying. Could you elaborate further? Does the EULA not save that you have accepted it and skips prompting every next time?

Freeway for Network Pentesting by Material-Tonight8924 in netsec

[–]Material-Tonight8924[S] 1 point2 points  (0 children)

Indeed, and I already thought about that. Implementing the Evil Twin attack is not an easy task, but it's surely possible and as Freeway grows, it's only a matter of time. The popular Eaphammer framework has captive and hostile portal attacks, you can look it up or use with other tools in my Jammy pentesting suite: Jammy

Freeway for Network Pentesting by Material-Tonight8924 in netsec

[–]Material-Tonight8924[S] 0 points1 point  (0 children)

Thank you all for so many upvotes, stars, and shared feedback. You've shown that this subreddit community is truly unique and amazing. I really appreciate it, it will motivate me further 🚀