A complete re-write of wifite, a Python script for auditing wireless networks.
Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!
wifite
was bad about this).--verbose
option (expandable to -vv
or -vvv
) shows which commands are executed & the output of those commands.Also Read BurpBounty – Active and Passive Scan Check Builder
--wept
, --wpst
, and other confusing switches). ./Wifite.py -h -v
-bully
) Pixie-Dust attack (enabled by-default, force with: --wps-only
)--no-wps
)pyrit
, tshark
, cowpatty
, and aircrack-ng
(when available)-c <channel>
switch.--no-deauths
switch-5
switch). aireplay-ng
)--cracked
) --crack
) aircrack-ng
, john
, hashcat
, or pyrit
.Only the latest versions of these programs are supported:
Required:
iwconfig
: For identifying wireless devices already in Monitor Mode.ifconfig
: For starting/stopping wireless devices.Aircrack-ng
suite, includes: aircrack-ng
: For cracking WEP .cap files and and WPA handshake captures.aireplay-ng
: For deauthing access points, replaying capture files, various WEP attacks.airmon-ng
: For enumerating and enabling Monitor Mode on wireless devices.airodump-ng
: For target scanning & capture file generation.packetforge-ng
: For forging capture files.Optional, but Recommended:
tshark
: For detecting WPS networks and inspecting handshake capture files.reaver
: For WPS Pixie-Dust attacks. wash
tool can be used to detect WPS networks if tshark
is not found.bully
: For WPS Pixie-Dust attacks. --bully
to use Bully instead of Reaver.reaver
cannot after cracking WPS PIN.cowpatty
: For detecting handshake captures.pyrit
: For detecting handshake captures.git clone https://github.com/derv82/wifite2.git
cd wifite2
./Wifite.py
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…