A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA/WPA2 and WEP, automated hash cracking, bluetooth hacking and much more.
Tested and supported in Kali Linux, Parrot OS, Arch Linux and Ubuntu
*However it's not finished and may have issues, try it at your own risk.*
-
I recommend you my alfa adapter: Alfa AWUS036ACM, which works really great with both, 2.4 and 5 Ghz
-
If you have any doubt, please contact me or create a issue
☑️ Deauthentication Attack
☑️ Authentication Attack
☑️ Beacon Flood Attack
☑️ PMKID Attack
☑️ EvilTwin Attack
☑️ Passive/Stealthy Attack
☑️ Pixie Dust Attack
☑️ Null Pin Attack
☑️ Chopchop Attack
☑️ Replay Attack
☑️ Michael Exploitation Attack
☑️ Caffe-Latte Attack
☑️ Jamming, Reading and Writing bluetooth connections
☑️ GPS Spoofing with HackRF
☑️ Log generator
☑️ WPA/WPA2, WPS and WEP Attacks
☑️ Auto handshake cracking
☑️ Multiple templates for EvilTwin attack
☑️ Check monitor mode and it status
☑️ 2Ghz and 5Ghz attacks
☑️ Custom wordlist selector
☑️ Auto detect requirements
☑️ Bluetooth support (Jamming, Reading, Writing)
Common usage of the framework
wef -i wlan0 # Your interface name might be different
or
wef --interface wlan0
Once the application is running, type help
to view more functions and useful info.
However I'll do a post on my blog about WEF and wifi hacking from zero to hero
Don't install them manually, WEF takes care of that if you don't already have them
aircrack-ng
reaver
mdk4
macchanger
hashcat
xterm
hcxtools
pixiewps
python3
btlejack
crackle
php
hostadp
dnsmasq
Checkout the Wiki
Demo on a Parrot OS with Kitty terminal
⚪ Specials thanks to ultrazar who helped me a lot <3
If you are using bspwm, you can add this line to your bspwmrc for launching the xterm windows always beeing in floating mode (for a prettier design)
bspc rule -a XTerm state=floating
If you consider this project has been useful, I would really appreciate supporting me by giving this repo a star or buying me a coffee.
Copyright © 2022, D3Ext