Wi-Fi

Cify – A WiFi Hacking Tool : Streamlining WiFi Security Assessment And Penetration Testing

Cify is a Ruby-based WiFi hacking tool designed for penetration testers, security researchers, and network administrators to assess the security of WiFi networks.

The tool aims to simplify the process of scanning networks, deauthenticating clients, and cracking WiFi passwords using the popular Aircrack-ng suite.

Cify provides a user-friendly terminal interface, allowing users to easily access various features with just a few clicks.

The tool’s modular design enables users to extend its functionality and incorporate additional WiFi hacking techniques with ease.

Key Features

  • Scan for nearby WiFi networks
  • Deauthenticate clients to capture handshakes
  • Crack WiFi passwords using password lists

System Requirements

  • Ruby
  • Aircrack-ng suite (aircrack-ng, airodump-ng, aireplay-ng)
  • libpcap-dev

Installation

  1. Clone the repository or download the source code.
  2. Navigate to the repository’s directory.
  3. Run ruby install.rb to install the tool and its dependencies.

Usage

Run the tool with the following command:

cify

You’ll be presented with a menu where you can choose between the following options:

  1. Scan networks
  2. Deauthenticate client
  3. Crack password
  4. Exit

Scan Networks

This option scans for nearby WiFi networks and saves the captured data to a .cap file for later analysis.

Deauthenticate Client

This option allows you to deauthenticate a client from a specific WiFi network and capture the handshake when the client reconnects.

Crack Password

This option takes the captured .cap file and a password list to crack the WiFi password.

Disclaimer

Using Cify or any similar tool for illegal activities is strictly prohibited and can lead to severe consequences.

The developers of Cify are not responsible for any misuse of the tool. This tool is intended to be used for educational purposes only.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

100 Days Of Rust 2025 : From Incident Response To Linux System Programming

In 2025 I wanted to try something new. In addition to a traditional 100 days…

2 days ago

Presenterm : Revolutionizing Terminal-Based Presentations With Markdown

presenterm lets you create presentations in markdown format and run them from your terminal, with…

2 days ago

JailbreakEval : Automating the Evaluation Of Language Model Security

Jailbreak is an attack that prompts a language model to give actionable responses to harmful…

2 days ago

HASH : Harnessing HTTP Agnostic Software Honeypots For Enhanced Cybersecurity

The main philosophy of HASH is to be easy to configure and flexible to mimic…

2 days ago

SECurityTr8Ker : SEC Cybersecurity Disclosure Monitor

SECurityTr8Ker is a Python application designed to monitor the U.S. Securities and Exchange Commission's (SEC)…

6 days ago

ripgrep : The Fast, Flexible Search Tool

ripgrep is a line-oriented search tool that recursively searches the current directory for a regex…

6 days ago