Skip to content
/ spyfi Public

SpyFi is an opensource wifi exploitation tool written in rust

License

Notifications You must be signed in to change notification settings

amitniz/spyfi

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

57 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SpyFi 📡

An Opensource Wifi Exploitation Tool written in rust 🦀

tui demonstration

Key Features

  • portable and light weight all-in-one tool.
  • easy to use terminal UI mode.
  • fast and powerful.

How to use

Spyfi has two modes of operation:

  • TUI mode.
  • CLI mode.

TUI mode launches when no arguments are given.

TUI:

The TUI mode provides an intuitive, informative UI from which you can monitor and attack nearby networks.

TUI Keymaps

Action Key(s)
Configuration Panel c
Switching Pane TAB
Send Deauth ENTER or d
Move Up Up Arrow Key or k
Move Down Down Arrow Key or j
Quit/Stop Attack q or ESC
Change Channel 1 to 9 (when Configuration Panel enabled)
Sweep Mode s (when Configuration Panel enabled)
random theme p

CLI:

Usage: spyfi <COMMAND>

Commands:
  utility
  enum
  attack
  help     Print this message or the help of the given subcommand(s)

Options:
  -h, --help     Print help
  -V, --version  Print version

utility mode

commands:

  • switch between managed/monitor mode.
  • change the iface channel.
  • generate psk.
Usage: spyfi utility [OPTIONS] [MODE]

Arguments:
  [MODE]  set the interface mode [possible values: managed, monitor]

Options:
  -i, --iface <IFACE>      name of the wlan interface
      --psk <PASSPHRASE>   generate psk
  -s, --ssid <SSID>        ssid
  -l, --list               list available interfaces
  -c, --channel <CHANNEL>  set capturing channel
      --ch
  -h, --help               Print help (see more with '--help')

enum mode

captures information about nearby networks

Usage: spyfi enum [OPTIONS] --iface <IFACE>

Options:
  -i, --iface <IFACE>            name of the wlan interface
  -t, --timeout <TIMEOUT>        timeout in seconds [default: 60]
  -o, --outputfile <OUTPUTFILE>  dump results into an outputfile
  -s, --sweep                    use channel sweeping
  -h, --help                     Print help

attack mode

performs dictionary attack on a network from a given pcap file

Usage: spyfi attack [OPTIONS] --type <ATTACKTYPE> --bssid <BSSID> <--iface <IFACE>|--capture <CAPTURE>>

Options:
  -a, --type <ATTACKTYPE>    attack type [possible values: dict, dos]
  -i, --iface <IFACE>        interface
  -c, --capture <CAPTURE>    capture file
  -t, --threads <THREADS>    number of threads to use for dictionary/bruteforce attack [default: 1]
      --target <TARGET>      target MAC for DoS attack [default: broadcast]
  -s, --ssid <SSID>          network's SSID. Might be used instead of BSSID and we will try to get it (Unrecommended)
  -b, --bssid <BSSID>        network's BSSID
      --sweep                use channel sweeping
      --wordlist <WORDLIST>  wordlist
  -h, --help                 Print help (see more with '--help')

Dependencies

  • libpcap-dev