|Project Name||Stars||Downloads||Repos Using This||Packages Using This||Most Recent Commit||Total Releases||Latest Release||Open Issues||License||Language|
|Wifite2||4,893||6 days ago||274||gpl-2.0||Python|
|Rewrite of the popular wireless network auditor, "wifite"|
|Kickthemout||2,166||7 months ago||103||mit||Python|
|💤 Kick devices off your network by performing an ARP Spoof attack.|
|Eaphammer||1,605||10 months ago||47||gpl-3.0||C|
|Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.|
|Wifipumpkin3||1,376||11 days ago||apache-2.0||Python|
|Powerful framework for rogue access point attack.|
|Wifi Arsenal||1,049||3 years ago||3||C|
|Infernal Twin||1,027||5 years ago||11||Python|
|wireless hacking - This is automated wireless hacking tool|
|Linset||413||7 years ago||40||gpl-3.0|
|Evil Twin Attack Bash script|
|Wirespy||407||8 months ago||4||apache-2.0||Shell|
|Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).|
|Pidense||361||3 years ago||3||gpl-3.0||Python|
|🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)|
|Wifi Penetration Testing Cheat Sheet||277||a month ago||mit|
|Work in progress...|
This repo is a complete re-write of
wifite, a Python script for auditing wireless networks.
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!
Wifite is designed to use all known methods for retrieving the password of a wireless access point (router). These methods include:
Run wifite, select your targets, and Wifite will automatically start trying to capture or crack the password.
Wifite is designed specifically for the latest version of Kali Linux. ParrotSec is also supported.
Other pen-testing distributions (such as BackBox or Ubuntu) have outdated versions of the tools used by Wifite. Do not expect support unless you are using the latest versions of the Required Tools, and also patched wireless drivers that support injection.
First and foremost, you will need a wireless card capable of "Monitor Mode" and packet injection (see this tutorial for checking if your wireless card is compatible and also this guide). There are many cheap wireless cards that plug into USB available from online stores.
Second, only the latest versions of these programs are supported and must be installed for Wifite to work properly:
python: Wifite is compatible with both
iwconfig: For identifying wireless devices already in Monitor Mode.
ifconfig: For starting/stopping wireless devices.
airmon-ng: For enumerating and enabling Monitor Mode on wireless devices.
aircrack-ng: For cracking WEP .cap files and WPA handshake captures.
aireplay-ng: For deauthing access points, replaying capture files, various WEP attacks.
airodump-ng: For target scanning & capture file generation.
packetforge-ng: For forging capture files.
Optional, but Recommended:
tshark: For detecting WPS networks and inspecting handshake capture files.
reaver: For WPS Pixie-Dust & brute-force attacks.
washtool can be used to detect WPS networks if
tsharkis not found.
bully: For WPS Pixie-Dust & brute-force attacks.
--bullyto use Bully instead of Reaver.
reavercannot after cracking WPS PIN.
coWPAtty: For detecting handshake captures.
pyrit: For detecting handshake captures.
hashcat: For cracking PMKID hashes.
hcxdumptool: For capturing PMKID hashes.
hcxpcaptool: For converting PMKID packet captures into
git clone https://github.com/derv82/wifite2.git cd wifite2 sudo ./Wifite.py
To install onto your computer (so you can just run
wifite from any terminal), run:
sudo python setup.py install
This will install
/usr/sbin/wifite which should be in your terminal path.
Note: Uninstalling is not as easy. The only way to uninstall is to record the files installed by the above command and remove those files:
sudo python setup.py install --record files.txt \ && cat files.txt | xargs sudo rm \ && rm -f files.txt
Comparing this repo to the "old wifite" @ derv82/wifite
wifitewas bad about this).
--verboseoption (expandable to
-vvv) shows which commands are executed & the output of those commands.
--wpst, and other confusing switches).
wifite -h -v
Cracking WPS PIN using
reaver's Pixie-Dust attack, then fetching WPA key using
Cracking WPA key using PMKID attack:
Decloaking & cracking a hidden access point (via the WPA Handshake attack):
Cracking a weak WEP password (using the WEP Replay attack):
Cracking a pre-captured handshake using John The Ripper (via the