AtEar Save

Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration

Project README

## AtEar AtEar is a scalable and efficient system, and also the first web-based wireless vulnerability assessment solution.
This Wireless Vulnerability Analysis/Management Solution, AtEar, can be utilized both by businesses and in the home.
For business use, AtEar utilizes fingerprint devices for access to the network and to analyze the current wireless network conditions.
The automatic penetration testing function makes it possible to analyze wireless vulnerability conveniently and meticulously.
AtEar for home networks inspects network security conditions and monitors for any unregistered devices.


In short, AtEar is a wireless pentest system.
AtEar provides a web-based user interface.
AtEar is easy and fast to use.

![alt AtEar_Product] (

Is your company’s wireless network secure?
AtEar helps keep your wireless network safe from hackers and intruders.

Operation Video

Operation Video Link

AtEar Features

  1. Wireless Scanning(Ad-Hoc, Station, Access Point, Soft-Acess Point)
  2. Wireless Chart(Channel, Encryption, Type)
  3. Wireless Pentesting(WEP, WPA1, WPA2)
  4. Network Information Getting(IP, Connected Host Info)
  5. Fake AP
  • Google Phishing Sites
  • Facebook Phishing Sites
  • Twitter Phishing Sites
  1. WIDS(Wireless intrusion detection system)
  • Disassocation Flood
  • Deauth Flood
  • WESSID-NG Attack
  • Koreck Chopchop attack
  • Fragmentation PGRA Attack
  • MDK MICHEAL SHUTDOWN Exploitation TKIP Attack
  • Attack By TKIPUN-NG
  • Authentication DOS Attack
  • Assocation Flood
  • High Amount of Assocation Sent
  • Suspect Rouge AP
  • Detected Beacon Flood

These features will be released this month.
Network Pentesting

  • FTP Brute Force
  • SSH Brute Force
  • Telnet Brute Force
  • SMTP Brute Force
  • POP Brute Force
  • IMAP Brute Force
  • LDAP Brute Force
  • SMB Brute Force
  • rlogin Brute Force
  • MSSQL Brute Force
  • MYSQL Brute Force
  • PGSQL Brute Force
  • VNC Brute Force
  • SNMP Brute Force

Developed by Ubuntu 14.04 LTS(amd64) and python 2.7v

It will aircrack-ng supoorted USB-Lancard
asus WL-167g v2
Airlink AWLL3026
Alfa AWUS036E
Alfa AWUS036G
Alfa AWUS036S
Alfa AWUS050NH
Digitus DN-7003GS
D-Link DWL-G122 B1
D-Link DWL-G122 C1
D-Link WUA-1340
Edimax EW-7318USg
Hawking HWUG1
Linksys WUSB54G v4
Linksys WUSB54GC v1
Linksys WUSB54GC v2
Netgear WG111 v1
Netgear WG111 v2
Netgear WG111 v3
Netgear WNDA3100 v1
TP-Link TL-WN321G
TP-Link TL-WN321G v4
Trendnet TEW-429UB C1
ZyXEL G-202

Dependency Programs


AtEar Installation Instructions

Clone a copy of the main AtEar git repo by running:
sudo apt-get install git
git clone
Enter the AtEar directory and run the install script:
cd ./AtEar/
sudo bash

How to Run

cd ./AtEar/
sudo python --iface wlan* <br> Open Web Browsers<br>`

AtEar Customers


AtEar’s flexible and convenient functionality can overcome the limitations of WIPS.
This achievement has led to partnerships with telecommunications companies SAMSUNG and KT. Many other small and middle-sized businesses and public institutions have chosen AtEar as their favorite wireless security solution thanks to its user friendliness and competitive cost. Satisfied customers include prominent institutions such as the Seoul City Hall, the Korea Rail Network Authority and Korea University.

AtEar-Demo Add-on Features

  1. A database for a particular sector of a wireless device can be specified.
  2. The demo program can provide the latest Access Point Firmware Database.
  3. The program has some project management capabilities.
  4. The program can provide a function report.
    AtEar-Demo is a free 30-Day Trial Version

Requesting the AtEar-Demo Version

NORMA-Inc Homepage
Contact us [email protected]

Open Source Agenda is not affiliated with "AtEar" Project. README Source: NORMA-Inc/AtEar
Open Issues
Last Commit
1 year ago

Open Source Agenda Badge

Open Source Agenda Rating