Airynox is a local-first wireless penetration testing dashboard for Linux that turns complex Wi-Fi attack workflows into a clean, real-time web interface.
Airynox runs as a FastAPI application with a vanilla HTML/CSS/JS frontend. There is no frontend build step, no framework overhead, and no dependency on a remote service. The project is designed for offensive security researchers and penetration testers who need a unified GUI for wireless operations instead of juggling multiple terminal tools.
Airynox is intended for authorized security testing, research, and lab use only.
You are solely responsible for ensuring your use complies with all applicable laws, regulations, contracts, and policies. Do not use this project against networks, devices, or users without explicit permission.
| Module | Description | Required Interface Mode |
|---|---|---|
| Interface Management | Detects wireless adapters, selects the active interface, and starts or stops monitor mode. All other modules consume the currently selected interface. | Managed or Monitor |
| WiFi Analyzer | Live wireless telemetry via airodump-ng, including SSID, BSSID, channel, signal, encryption, client count, and vendor lookup. Access points can be expanded to inspect connected clients. |
Monitor |
| Deauth | Performs a discovery scan, selects a target AP, and launches either full-network deauthentication or a client-specific attack with live packet and elapsed-time tracking. | Monitor |
| Rogue AP | Launches an open access point with a captive portal. Includes Free WiFi, Google-style, and Corporate templates, plus custom HTML upload. Captured credentials are stored in SQLite and remain available after restart. | Managed |
| Beacon Spam | Broadcasts large sets of fake SSIDs with mdk4 using manual input, file upload, random generation, or pattern expansion such as Elok1 ... ElokN. |
Monitor |
| Handshake Capture | Scans targets, captures WPA handshakes with hcxdumptool, detects successful capture, converts output to .22000, and prepares it for hashcat -m 22000. |
Monitor |
- Linux
- Python
3.11+ - A wireless adapter and driver stack that support the required managed and monitor mode workflows
sudoaccess for wireless interface and service orchestration
Create a virtual environment and install the application requirements:
python3 -m venv .venv
source .venv/bin/activate
pip install --upgrade pip
pip install -r requirements.txtCurrent Python packages from requirements.txt:
fastapi==0.116.1uvicorn[standard]==0.35.0
Airynox depends on the following system tools being available on the host:
iwairmon-ngairodump-ngaireplay-ngmdk4hcxdumptoolhcxpcapngtoolhostapddnsmasqiptables
These tools are used directly by the FastAPI backend for interface control, telemetry collection, packet injection, rogue AP orchestration, and handshake conversion.
Start the application from the project root:
sudo python main.pyAirynox serves locally at:
http://127.0.0.1:8000
Airynox/
├── core/
│ ├── beacon_spam.py
│ ├── deauth.py
│ ├── handshake.py
│ ├── interface_manager.py
│ ├── rogue_ap.py
│ ├── wifi_analyzer.py
│ └── wifi_csv.py
├── static/
│ ├── app.js
│ ├── index.html
│ ├── style.css
│ └── portals/
│ ├── portal_corporate.html
│ ├── portal_custom_example.html
│ ├── portal_google.html
│ └── portal_wifi.html
├── files/
│ └── manuf
├── main.py
└── requirements.txt
core/contains the backend service modules for wireless operations and interface coordination.static/contains the no-build frontend, including the captive portal templates.files/stores bundled supporting data such as vendor lookup assets.main.pyboots the FastAPI app, mounts static assets, exposes APIs, and wires module state together.requirements.txtdefines the Python runtime dependencies.
| Layer | Technologies |
|---|---|
| Backend | Python, FastAPI, Uvicorn |
| Frontend | Vanilla HTML, CSS, JavaScript |
| Data Storage | SQLite |
| Real-Time Transport | WebSockets |
| Wireless Tooling | aircrack-ng suite, mdk4, hcxdumptool, hcxpcapngtool |
| AP and Network Services | hostapd, dnsmasq, iptables |
Umut Can Yurdayardım
Offensive Security Researcher
- X: @umut_sec
- GitHub: UmutCanYY
- Website: umutsec.com
MIT
