▄█ █▄ ▄███████▄ ████████▄ ▄████████ ███ ███ ███ ███ ███ ▀███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ███ ▀█████████▀ ███ ███ ▀███████████ ███ ███ ███ ███ ███ ███ ███ ███ ▄█▄ ███ ███ ███ ▄███ ███ ███ ▀███▀███▀ ▄████▀ ████████▀ ███ █▀
Creative name, I know.
Requirements:
-
npcap https://npcap.com/
- Enable "Support raw 802.11 traffic (and monitor mode) for wireless adapters" on the installer menu.
-
Windows only. (See other projects for Mac/Linux builds).
-
Interface that supports monitor mode (Here is the one I used for Windows: {INSERT AMAZON LINK HERE}]).
This open-source Windows-based tool, built in Python, is used to attack nearby wireless networks.
This tool is designed for educational purposes to help individuals understand and improve the security of their Wi-Fi networks. It allows users to scan for Wi-Fi networks, perform deauthentication attacks, and capture WPA/WPA2 handshakes.
This software is provided for educational purposes only. The authors of this tool do not condone or support any illegal or unethical activities. The use of this tool to access computer systems, networks, or data without authorization is illegal and punishable by law.
-
Intended Use: This tool is intended to be used solely for educational purposes and to help users test the security of their own Wi-Fi networks or networks for which they have explicit permission to test.
-
Legal Compliance: Users must comply with all applicable local, state, national, and international laws and regulations when using this software. The authors are not responsible for any misuse or damage caused by this software.
-
User Responsibility: By using this software, you agree that you are solely responsible for any actions taken with it. The authors disclaim all liability for any actions taken by users that violate any laws, infringe upon rights, or cause any harm or damage.
-
Prohibited Use: Unauthorized use of this software to compromise or harm computer systems, networks, or data is strictly prohibited. This includes, but is not limited to, unauthorized penetration testing, network eavesdropping, and data theft.
To install the necessary dependencies, run:
We welcome contributions to this project. Please ensure that your contributions comply with our terms of use and legal disclaimer.
This project is licensed under the MIT License. See the LICENSE file for more details.