- portable and light weight all-in-one tool.
- easy to use terminal UI mode.
- fast and powerful.
Spyfi has two modes of operation:
- TUI mode.
- CLI mode.
TUI mode launches when no arguments are given.
The TUI mode provides an intuitive, informative UI from which you can monitor and attack nearby networks.
Action | Key(s) |
---|---|
Configuration Panel | c |
Switching Pane | TAB |
Send Deauth | ENTER or d |
Move Up | Up Arrow Key or k |
Move Down | Down Arrow Key or j |
Quit/Stop Attack | q or ESC |
Change Channel | 1 to 9 (when Configuration Panel enabled) |
Sweep Mode | s (when Configuration Panel enabled) |
random theme | p |
Usage: spyfi <COMMAND>
Commands:
utility
enum
attack
help Print this message or the help of the given subcommand(s)
Options:
-h, --help Print help
-V, --version Print version
commands:
- switch between managed/monitor mode.
- change the iface channel.
- generate psk.
Usage: spyfi utility [OPTIONS] [MODE]
Arguments:
[MODE] set the interface mode [possible values: managed, monitor]
Options:
-i, --iface <IFACE> name of the wlan interface
--psk <PASSPHRASE> generate psk
-s, --ssid <SSID> ssid
-l, --list list available interfaces
-c, --channel <CHANNEL> set capturing channel
--ch
-h, --help Print help (see more with '--help')
captures information about nearby networks
Usage: spyfi enum [OPTIONS] --iface <IFACE>
Options:
-i, --iface <IFACE> name of the wlan interface
-t, --timeout <TIMEOUT> timeout in seconds [default: 60]
-o, --outputfile <OUTPUTFILE> dump results into an outputfile
-s, --sweep use channel sweeping
-h, --help Print help
performs dictionary attack on a network from a given pcap file
Usage: spyfi attack [OPTIONS] --type <ATTACKTYPE> --bssid <BSSID> <--iface <IFACE>|--capture <CAPTURE>>
Options:
-a, --type <ATTACKTYPE> attack type [possible values: dict, dos]
-i, --iface <IFACE> interface
-c, --capture <CAPTURE> capture file
-t, --threads <THREADS> number of threads to use for dictionary/bruteforce attack [default: 1]
--target <TARGET> target MAC for DoS attack [default: broadcast]
-s, --ssid <SSID> network's SSID. Might be used instead of BSSID and we will try to get it (Unrecommended)
-b, --bssid <BSSID> network's BSSID
--sweep use channel sweeping
--wordlist <WORDLIST> wordlist
-h, --help Print help (see more with '--help')
- libpcap-dev