Skip to content
(⌐■_■) pwnagotchi
JavaScript Python CSS HTML PowerShell Shell
Branch: master
Clone or download
Pull request Compare This branch is 7 commits ahead, 95 commits behind evilsocket:master.
Latest commit 3d1361e Dec 21, 2019
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github Create FUNDING.yml Oct 9, 2019
bin misc: small fix or general refactoring i did not bother commenting Dec 7, 2019
builder fix Dec 21, 2019
pwnagotchi releasing v1.4.2 Dec 19, 2019
scripts fix (find with type f for no zero byte files into archive) Nov 19, 2019
.DEREK.yml 💔 Oct 16, 2019
.editorconfig Update .editorconfig Nov 10, 2019
.gitignore Ignore backup archives. Use 'find | xargs' to handle missing files. C… Nov 10, 2019
.travis.yml Create Oct 3, 2019 add templates and Oct 3, 2019 hello world Sep 19, 2019
Makefile add travis_wait Dec 20, 2019 misc: small fix or general refactoring i did not bother commenting Nov 4, 2019
requirements.txt fix Dec 21, 2019 Update Dec 2, 2019


Release Software License Contributors Travis Slack Forum follow on Twitter

Pwnagotchi is an A2C-based "AI" leveraging bettercap that learns from its surrounding WiFi environment to maximize the crackable WPA key material it captures (either passively, or by performing authentication and association attacks). This material is collected as PCAP files containing any form of handshake supported by hashcat, including PMKIDs, full and half WPA handshakes.


Instead of merely playing Super Mario or Atari games like most reinforcement learning-based "AI" (yawn), Pwnagotchi tunes its parameters over time to get better at pwning WiFi things to in the environments you expose it to.

More specifically, Pwnagotchi is using an LSTM with MLP feature extractor as its policy network for the A2C agent. If you're unfamiliar with A2C, here is a very good introductory explanation (in comic form!) of the basic principles behind how Pwnagotchi learns. (You can read more about how Pwnagotchi learns in the Usage doc.)

Keep in mind: Unlike the usual RL simulations, Pwnagotchi learns over time. Time for a Pwnagotchi is measured in epochs; a single epoch can last from a few seconds to minutes, depending on how many access points and client stations are visible. Do not expect your Pwnagotchi to perform amazingly well at the very beginning, as it will be exploring several combinations of key parameters to determine ideal adjustments for pwning the particular environment you are exposing it to during its beginning epochs ... but ** listen to your Pwnagotchi when it tells you it's boring!** Bring it into novel WiFi environments with you and have it observe new networks and capture new handshakes—and you'll see. :)

Multiple units within close physical proximity can "talk" to each other, advertising their presence to each other by broadcasting custom information elements using a parasite protocol I've built on top of the existing dot11 standard. Over time, two or more units trained together will learn to cooperate upon detecting each other's presence by dividing the available channels among them for optimal pwnage.



  Official Links
Subreddit r/pwnagotchi
Twitter @pwnagotchi


pwnagotchi is made with ♥ by @evilsocket and the amazing dev team. It is released under the GPL3 license.

You can’t perform that action at this time.