Attacks • Features • Installation • Uninstallation • Disclaimer
A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA/WPA2 and WEP, automated hash cracking, and much more.
Tested and supported in Kali Linux, Parrot OS and Arch Linux. If you have any error please open an issue (if you want to write it in spanish you can do it). If you have any doubt, please contact me via Discord D3Ext#5965
If you don't know how wifi hacking works you can read my free course here, it's written in Spanish and I explain things from 0
- I recommend you my alfa adapter: Alfa AWUS036ACM, which works really great with both, 2.4 and 5 Ghz
-
Deauthentication Attack
-
Authentication Attack
-
Beacon Flood Attack
-
PMKID Attack
-
EvilTwin Attack
-
Passive/Stealthy Attack
-
Pixie Dust Attack
-
Null Pin Attack
-
WEP Protocol Attacks
-
Michael Exploitation Attack
☑️ WPA/WPA2, WPS and WEP Attacks
☑️ Auto handshake capture and cracking
☑️ Multiple templates for EvilTwin attack (even custom)
☑️ Check monitor mode and its status
☑️ 2.4Ghz and 5Ghz attacks
☑️ Descriptive attack logs (just done user side)
☑️ Custom wordlist selector
Common usage of the framework
wef -i wlan0 # Your interface name might be different
or
wef --interface wlan0
Once the application is running, type help
to view more functions and useful info.
Don't install them manually, WEF takes care of that if you don't already have them
aircrack-ng
reaver
mdk4
macchanger
hashcat
xterm
hcxtools
pixiewps
python3
php
hostadp
dnsmasq
Checkout the Wiki where I have more info about the program
Checkout the Wiki
Demo on a Parrot OS with Kitty Terminal
Special thanks to ultrazar who helped me a lot <3
Do you want to contribute with any interesting idea? You're in te right place
1
Open an issue to discuss your idea
2
Fork the repo
3
Create a branch
4
Commit your changes
5
Push to the branch
6
Create a new pull request
New features and bugs reports are welcome
Creator isn't in charge of any and has no responsibility for any kind of:
- Unlawful or illegal use of the project.
- Legal or Law infringement (acted in any country, state, municipality, place) by third parties and users.
- Act against ethical and / or human moral, ethic, and peoples of the world.
- Malicious act, capable of causing damage to third parties, promoted or distributed by third parties or the user through this software.
This project is under MIT license
Copyright © 2023, D3Ext