A Suite of Tools written in Python for wireless auditing and security testing.
Switch branches/tags
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
.idea Fixed taskkill Nov 26, 2017
Images Several Fixes Dec 11, 2017
UnitTests Fixes Feb 13, 2018
core Fixed deauth packet count Dec 12, 2017
modules Channel hopping improvements May 22, 2018
.gitignore V2.0.0 Fixes Dec 4, 2017
CHANGELOG V2.0.1 Dec 11, 2017
LICENSE Fixed taskkill Nov 26, 2017
README.md Minor Changes Mar 12, 2018
install.py Fixed get dev branch of scapy Dec 11, 2017
requirements.txt Minor Changes Mar 12, 2018

README.md

BoopSuite

Synopsis:

BoopSuite a wireless pentesting suite designed to emulate aircrack-ng functionality for personal growth.

This Used To Be An Image But Now It Is Not. :(

This suite includes:

  • A wireless sniffer
  • A wireless deauthentication script
  • A monitor mode enabler

Note:

I hope my project can aid everyone in their pentesting needs, and this project is going to continue to grow as I add new handlers for additional packet types.

Changelog located in CHANGELOG file.

Hopefully others find it useful. If you do please email me and let me know I would love to hear about it @ jayrad.security@protonmail.com

Donate

Bitcoin Address: 1KJizmcsb7xRy9UwyYbgsy9NzSGdXMdaKy

Ethereum Address: 0xadd48827c47e809670737600f1456873bac31201

More ideas are welcome. Email me @: jayrad.security@protonmail.com

Requirements:

  • Kali linux or Parrot linux
  • dev version of scapy

Examples:

This Used To Be An Image But Now It Is Not. :(

To start sniffing:

BoopSniff -i wlan1mon

To specify a channel:

BoopSniff -i wlan1mon -c 6

Boop also works on the 5ghz spectrum if you have a supporting card:

BoopSniff -i wlan1mon -f 5

If some processes are interfering then you can preemptively kill them with:

BoopSniff -i wlan1mon -k

If you want to see unassociated clients:

BoopSniff -i wlan1mon -u

If you want to filter by a specific AP mac address:

BoopSniff -i wlan1mon -a xx:xx:xx:xx:xx:xx

If you want to filter by a list of AP mac address:

BoopSniff -i wlan1mon -a xx:xx:xx:xx:xx:xx yy:yy:yy:yy:yy:yy

To launch a deauth attack:

BoopStrike -i wlan1mon

Deauth the 5ghz spectrum:

BoopStrike -i wlan1mon -f 5

Deauth a single AP:

BoopStrike -i wlan1mon -a xx:xx:xx:xx:xx:xx

Deauth everyone except one Access Point:

BoopStrike -i wlan1mon -s xx:xx:xx:xx:xx:xx

Set card to monitor mode:

BoopMon -i wlan1

Set card to managed mode:

BoopMon -i wlan1mon

Set card to a specific name:

BoopMon -i wlan1 -n wlanmon1

note: will enable or disable monitor mode accordingly.

Set channel on card:

BoopMon -i wlan1 -c 11

Note: Will do error checking if you specify a channel the card doesnt support and is ready for cards supporting the 5GHz network.

Kill any interfering tasks:

BoopMon -i wlan1 -k

Put it all together:

BoopMon -i wlan1 -n BoopMon1 -c 11 -k

NOTE: BoopMon will always switch the mode from managed to monitor and vice versa.

Note: all pcap files will be saved in the directory ~/pcaps

This Used To Be An Image But Now It Is Not. :(

More options are coming in the future.

Installation:

To install open a terminal and type:

git clone https://github.com/M1ND-B3ND3R/BoopSuite.git
cd BoopSuite
sudo pip install -r requirements.txt
chmod +x install.py
./install.py

The setup includes creating symbolic links for the tool so it can be run from anywhere.

Upgrade:

To upgrade open a terminal and type:

Requires root to install

Root is dangerous so always check packages before running them as root. My code is not malicious, however, you should always be wary.

git clone https://github.com/M1ND-B3ND3R/BoopSuite.git
cd BoopSuite
chmod +x install.py
./install.py

Motivation:

I am motivated by the want to be better. To prove others wrong and to prove to myself that I can do things that were previously impossible to me.

In Progress:

  • Wireless card discovery in VM for kali.

  • Code Fixes will be happening.

License:

MIT License (c) MisterBianco, 2017