Requirements: 4.1 and up
Overview: Do you want to know if your Wireless Access Point is vulnerable to the WPS protocol? Wps Wpa Tester is the app that you need!
Do you want to know if your Wireless Access Point is vulnerable to the WPS protocol?
Wps Wpa Tester is the app that you need!
With this app, you can try the connection to an Wi-Fi Access Point via WPS PIN.
PINs are calculated with several algorithms throught MAC Address and there are others PINs included in a local database for many Access Point.
Luckily just a small part of Wireless Access Point are vulnerable to WPS protocol.
If you will find out that your Access Point has WPS protocol enabled, we suggest to disable it.
The purpose of the app is educational to let the customers know about vulnerability of their own Access Point.
There are many connection mode with this app and you can try the bruteforce mode either.
App also discovers if an Access Point with WPS enabled is invulnerable (WPS LOCKED).
App allows users with root permissions to see Wi-Fi passwords saved.
Some important Notes:
App needs root permissions for devices with Android version For devices with Android >= 5.0 you can test the PINs with this app and you can connect, but you cannot see the password without root permissions.
Use this app only with your own AP for do not go against the law.
★★★Premium Mod ★★★★
Mod Info:
Remove Ads(Bought/Patched)
ByPassed Signature Verification
★★★ Patched ★★★
Mod Info:
Premium/Paid Build (Thanks To Katafrakt For The Apk)
License Patched
ByPassed Signature Verification
Whats New:
– Bug fix
– Null PIN
This app has no advertisements
More Info:
https://play.google.com/store/apps/details?id=com.tester.wpswpatester&hl=en
https://play.google.com/store/apps/details?id=as.wps.wpatester&hl=en
Download Instructions: credit Shawon2901
Mod:
userupload.net
Mirrors:
rapidgator.net
uploadev.org
Patched:
userupload.net
Mirrors:
rapidgator.net
uploadev.org
? ?f=19&t=.
If you want to download at full speed and help us keep this site active, you can register by clicking on the banner below.