from rich.prompt import Prompt
from core import HackingTool, HackingToolsCollection, console
class WIFIPumpkin(HackingTool):
TITLE = "WiFi-Pumpkin"
DESCRIPTION = (
"The WiFi-Pumpkin is a rogue AP framework to easily create fake networks\n"
"while forwarding legitimate traffic to and from the unsuspecting target."
)
INSTALL_COMMANDS = [
"sudo apt install -y libssl-dev libffi-dev build-essential python3-pyqt5",
"git clone https://github.com/P0cL4bs/wifipumpkin3.git",
"chmod -R 755 wifipumpkin3",
"cd wifipumpkin3 && pip install --user .",
]
RUN_COMMANDS = ["sudo wifipumpkin3"]
PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3"
SUPPORTED_OS = ["linux"]
REQUIRES_WIFI = True
class pixiewps(HackingTool):
TITLE = "pixiewps"
DESCRIPTION = (
"Pixiewps is a tool written in C used to bruteforce offline the WPS pin\n"
"exploiting the low or non-existing entropy of some Access Points "
"(pixie dust attack)."
)
INSTALL_COMMANDS = [
"git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential",
"cd pixiewps && make",
"cd pixiewps && sudo make install",
]
PROJECT_URL = "https://github.com/wiire/pixiewps"
SUPPORTED_OS = ["linux"]
REQUIRES_WIFI = True
def run(self):
console.print(
"[bold cyan]Usage:[/bold cyan]\n"
" 1. Put interface into monitor mode: [yellow]airmon-ng start <iface>[/yellow]\n"
" 2. Scan: [yellow]wash -i <mon-iface>[/yellow]\n"
" 3. Attack: [yellow]reaver -i <mon-iface> -b <BSSID> -c <ch> -vvv -K 1 -f[/yellow]\n"
" 4. Run: [yellow]pixiewps -h[/yellow]"
)
class BluePot(HackingTool):
TITLE = "Bluetooth Honeypot GUI Framework"
DESCRIPTION = (
"You need at least 1 bluetooth receiver.\n"
"Install libbluetooth-dev (Ubuntu) / bluez-libs-devel (Fedora) / bluez-devel (openSUSE)."
)
INSTALL_COMMANDS = [
"sudo wget https://raw.githubusercontent.com/andrewmichaelsmith/bluepot/master/bin/bluepot-0.2.tar.gz",
"sudo tar xfz bluepot-0.2.tar.gz && sudo rm bluepot-0.2.tar.gz",
]
RUN_COMMANDS = ["cd bluepot && sudo java -jar bluepot.jar"]
PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot"
SUPPORTED_OS = ["linux"]
REQUIRES_JAVA = True
class Fluxion(HackingTool):
TITLE = "Fluxion"
DESCRIPTION = "Fluxion is a remake of linset by vk496 with enhanced functionality."
INSTALL_COMMANDS = [
"git clone https://github.com/FluxionNetwork/fluxion.git",
"cd fluxion && chmod +x fluxion.sh",
]
RUN_COMMANDS = ["cd fluxion && sudo bash fluxion.sh -i"]
PROJECT_URL = "https://github.com/FluxionNetwork/fluxion"
SUPPORTED_OS = ["linux"]
REQUIRES_WIFI = True
class Wifiphisher(HackingTool):
TITLE = "Wifiphisher"
DESCRIPTION = (
"Wifiphisher is a rogue Access Point framework for conducting red team engagements\n"
"or Wi-Fi security testing. Easily achieve man-in-the-middle position against\n"
"wireless clients by performing targeted Wi-Fi association attacks."
)
INSTALL_COMMANDS = [
"git clone https://github.com/wifiphisher/wifiphisher.git",
"cd wifiphisher && pip install --user .",
]
RUN_COMMANDS = ["cd wifiphisher && sudo wifiphisher"]
PROJECT_URL = "https://github.com/wifiphisher/wifiphisher"
SUPPORTED_OS = ["linux"]
REQUIRES_WIFI = True
class Wifite(HackingTool):
TITLE = "Wifite"
DESCRIPTION = "Wifite is an automated wireless attack tool."
INSTALL_COMMANDS = [
"git clone https://github.com/derv82/wifite2.git",
"cd wifite2 && pip install --user .",
]
RUN_COMMANDS = ["sudo wifite"]
PROJECT_URL = "https://github.com/derv82/wifite2"
SUPPORTED_OS = ["linux"]
REQUIRES_WIFI = True
class EvilTwin(HackingTool):
TITLE = "EvilTwin"
DESCRIPTION = (
"Fakeap — perform Evil Twin Attack by getting credentials "
"using a Fake page and Fake Access Point."
)
INSTALL_COMMANDS = ["git clone https://github.com/Z4nzu/fakeap.git"]
RUN_COMMANDS = ["cd fakeap && sudo bash fakeap.sh"]
PROJECT_URL = "https://github.com/Z4nzu/fakeap"
SUPPORTED_OS = ["linux"]
REQUIRES_WIFI = True
class Fastssh(HackingTool):
TITLE = "Fastssh"
DESCRIPTION = (
"Fastssh — multi-threaded scan and brute force attack against SSH protocol\n"
"using the most commonly used credentials."
)
INSTALL_COMMANDS = [
"git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && chmod +x fastssh.sh",
"sudo apt-get install -y sshpass netcat",
]
RUN_COMMANDS = ["cd fastssh && sudo bash fastssh.sh --scan"]
PROJECT_URL = "https://github.com/Z4nzu/fastssh"
SUPPORTED_OS = ["linux"]
class Howmanypeople(HackingTool):
TITLE = "Howmanypeople"
DESCRIPTION = (
"Count the number of people around you by monitoring wifi signals.\n"
"[@] WIFI ADAPTER REQUIRED\n"
"[*] It may be illegal to monitor networks for MAC addresses on networks you do not own."
)
INSTALL_COMMANDS = [
"sudo apt-get install -y tshark",
"sudo python3 -m pip install howmanypeoplearearound",
]
RUN_COMMANDS = ["howmanypeoplearearound"]
SUPPORTED_OS = ["linux"]
REQUIRES_WIFI = True
class Airgeddon(HackingTool):
TITLE = "Airgeddon (Wireless Attack Suite)"
DESCRIPTION = (
"Multi-use bash script for auditing wireless networks.\n"
"Covers WPA/WPA2, WEP, WPS, PMKID, evil twin, handshake capture and more."
)
SUPPORTED_OS = ["linux"]
REQUIRES_WIFI = True
INSTALL_COMMANDS = [
"git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git",
]
RUN_COMMANDS = ["cd airgeddon && sudo bash airgeddon.sh"]
PROJECT_URL = "https://github.com/v1s1t0r1sh3r3/airgeddon"
class Hcxdumptool(HackingTool):
TITLE = "hcxdumptool (PMKID Capture)"
DESCRIPTION = (
"Capture packets and PMKID hashes from WLAN devices.\n"
"Usage: hcxdumptool -i <iface> -o capture.pcapng --enable_status=1"
)
SUPPORTED_OS = ["linux"]
REQUIRES_WIFI = True
INSTALL_COMMANDS = [
"git clone https://github.com/ZerBea/hcxdumptool.git",
"cd hcxdumptool && make && sudo make install",
]
RUN_COMMANDS = ["hcxdumptool --help"]
PROJECT_URL = "https://github.com/ZerBea/hcxdumptool"
class Hcxtools(HackingTool):
TITLE = "hcxtools (PMKID/Hash Conversion)"
DESCRIPTION = (
"Convert captured WLAN packets to hashcat/JtR-compatible format.\n"
"Usage: hcxpcapngtool -o hashes.txt capture.pcapng"
)
SUPPORTED_OS = ["linux"]
INSTALL_COMMANDS = [
"git clone https://github.com/ZerBea/hcxtools.git",
"cd hcxtools && make && sudo make install",
]
RUN_COMMANDS = ["hcxpcapngtool --help"]
PROJECT_URL = "https://github.com/ZerBea/hcxtools"
class Bettercap(HackingTool):
TITLE = "Bettercap (Network/WiFi/BLE MITM)"
DESCRIPTION = "Swiss army knife for WiFi, BLE, HID, and Ethernet network recon and MITM attacks."
SUPPORTED_OS = ["linux"]
INSTALL_COMMANDS = ["sudo apt-get install -y bettercap"]
RUN_COMMANDS = ["sudo bettercap --help"]
PROJECT_URL = "https://github.com/bettercap/bettercap"
class WirelessAttackTools(HackingToolsCollection):
TITLE = "Wireless attack tools"
TOOLS = [
WIFIPumpkin(),
pixiewps(),
BluePot(),
Fluxion(),
Wifiphisher(),
Wifite(),
EvilTwin(),
Fastssh(),
Howmanypeople(),
Airgeddon(),
Hcxdumptool(),
Hcxtools(),
Bettercap(),
]
if __name__ == "__main__":
tools = WirelessAttackTools()
tools.show_options()