Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Z4nzu
GitHub Repository: Z4nzu/hackingtool
Path: blob/master/tools/wireless_attack_tools.py
1269 views
1
# coding=utf-8
2
import os
3
4
from core import HackingTool
5
from core import HackingToolsCollection
6
7
8
class WIFIPumpkin(HackingTool):
9
TITLE = "WiFi-Pumpkin"
10
DESCRIPTION = "The WiFi-Pumpkin is a rogue AP framework to easily create " \
11
"these fake networks\n" \
12
"all while forwarding legitimate traffic to and from the " \
13
"unsuspecting target."
14
INSTALL_COMMANDS = [
15
"sudo apt install libssl-dev libffi-dev build-essential",
16
"sudo git clone https://github.com/P0cL4bs/wifipumpkin3.git",
17
"chmod -R 755 wifipumpkin3",
18
"sudo apt install python3-pyqt5",
19
"cd wifipumpkin3;sudo python3 setup.py install"
20
]
21
RUN_COMMANDS = ["sudo wifipumpkin3"]
22
PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3"
23
24
25
class pixiewps(HackingTool):
26
TITLE = "pixiewps"
27
DESCRIPTION = "Pixiewps is a tool written in C used to bruteforce offline " \
28
"the WPS pin\n " \
29
"exploiting the low or non-existing entropy of some Access " \
30
"Points, the so-called pixie dust attack"
31
INSTALL_COMMANDS = [
32
"sudo git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential",
33
"cd pixiewps*/ && make",
34
"cd pixiewps*/ && sudo make install && wget https://pastebin.com/y9Dk1Wjh"
35
]
36
PROJECT_URL = "https://github.com/wiire/pixiewps"
37
38
def run(self):
39
os.system(
40
'echo "'
41
'1.> Put your interface into monitor mode using '
42
'\'airmon-ng start {wireless interface}\n'
43
'2.> wash -i {monitor-interface like mon0}\'\n'
44
'3.> reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f"'
45
'| boxes -d boy')
46
print("You Have To Run Manually By USing >>pixiewps -h ")
47
48
49
class BluePot(HackingTool):
50
TITLE = "Bluetooth Honeypot GUI Framework"
51
DESCRIPTION = "You need to have at least 1 bluetooth receiver " \
52
"(if you have many it will work with those, too).\n" \
53
"You must install/libbluetooth-dev on " \
54
"Ubuntu/bluez-libs-devel on Fedora/bluez-devel on openSUSE"
55
INSTALL_COMMANDS = [
56
"sudo wget https://raw.githubusercontent.com/andrewmichaelsmith/bluepot/master/bin/bluepot-0.2.tar.gz"
57
"sudo tar xfz bluepot-0.2.tar.gz;sudo rm bluepot-0.2.tar.gz"
58
]
59
RUN_COMMANDS = ["cd bluepot && sudo java -jar bluepot.jar"]
60
PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot"
61
62
63
class Fluxion(HackingTool):
64
TITLE = "Fluxion"
65
DESCRIPTION = "Fluxion is a remake of linset by vk496 with enhanced functionality."
66
INSTALL_COMMANDS = [
67
"git clone https://github.com/FluxionNetwork/fluxion.git",
68
"cd fluxion && sudo chmod +x fluxion.sh",
69
]
70
RUN_COMMANDS = ["cd fluxion;sudo bash fluxion.sh -i"]
71
PROJECT_URL = "https://github.com/FluxionNetwork/fluxion"
72
73
74
class Wifiphisher(HackingTool):
75
TITLE = "Wifiphisher"
76
DESCRIPTION = """
77
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing.
78
Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing
79
targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the
80
connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the
81
victim stations with malware..\n
82
For More Details Visit >> https://github.com/wifiphisher/wifiphisher
83
"""
84
INSTALL_COMMANDS = [
85
"git clone https://github.com/wifiphisher/wifiphisher.git",
86
"cd wifiphisher;sudo python3 setup.py install"
87
]
88
RUN_COMMANDS = ["cd wifiphisher;sudo wifiphisher"]
89
PROJECT_URL = "https://github.com/wifiphisher/wifiphisher"
90
91
92
class Wifite(HackingTool):
93
TITLE = "Wifite"
94
DESCRIPTION = "Wifite is an automated wireless attack tool"
95
INSTALL_COMMANDS = [
96
"sudo git clone https://github.com/derv82/wifite2.git",
97
"cd wifite2 && sudo python3 setup.py install"
98
]
99
RUN_COMMANDS = ["cd wifite2; sudo wifite"]
100
PROJECT_URL = "https://github.com/derv82/wifite2"
101
102
103
class EvilTwin(HackingTool):
104
TITLE = "EvilTwin"
105
DESCRIPTION = "Fakeap is a script to perform Evil Twin Attack, by getting" \
106
" credentials using a Fake page and Fake Access Point"
107
INSTALL_COMMANDS = ["sudo git clone https://github.com/Z4nzu/fakeap.git"]
108
RUN_COMMANDS = ["cd fakeap && sudo bash fakeap.sh"]
109
PROJECT_URL = "https://github.com/Z4nzu/fakeap"
110
111
112
class Fastssh(HackingTool):
113
TITLE = "Fastssh"
114
DESCRIPTION = "Fastssh is an Shell Script to perform multi-threaded scan" \
115
" \n and brute force attack against SSH protocol using the " \
116
"most commonly credentials."
117
INSTALL_COMMANDS = [
118
"sudo git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && sudo chmod +x fastssh.sh",
119
"sudo apt-get install -y sshpass netcat"
120
]
121
RUN_COMMANDS = ["cd fastssh && sudo bash fastssh.sh --scan"]
122
PROJECT_URL = "https://github.com/Z4nzu/fastssh"
123
124
125
class Howmanypeople(HackingTool):
126
TITLE = "Howmanypeople"
127
DESCRIPTION = "Count the number of people around you by monitoring wifi " \
128
"signals.\n" \
129
"[@] WIFI ADAPTER REQUIRED* \n[*]" \
130
"It may be illegal to monitor networks for MAC addresses, \n" \
131
"especially on networks that you do not own. " \
132
"Please check your country's laws"
133
INSTALL_COMMANDS = [
134
"sudo apt-get install tshark"
135
";sudo python3 -m pip install howmanypeoplearearound"
136
]
137
RUN_COMMANDS = ["howmanypeoplearearound"]
138
139
140
class WirelessAttackTools(HackingToolsCollection):
141
TITLE = "Wireless attack tools"
142
DESCRIPTION = ""
143
TOOLS = [
144
WIFIPumpkin(),
145
pixiewps(),
146
BluePot(),
147
Fluxion(),
148
Wifiphisher(),
149
Wifite(),
150
EvilTwin(),
151
Fastssh(),
152
Howmanypeople()
153
]
154
155