Packages and Binaries:
wifipumpkin3
This package contains a powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.
Installed size: 29.24 MB
How to install: sudo apt install wifipumpkin3
Dependencies:
- hostapd
- iptables
- iw
- net-tools
- python3
- python3-aiofiles
- python3-bs4
- python3-dhcplib
- python3-distutils
- python3-dnslib
- python3-dnspython
- python3-flask
- python3-flask-restful
- python3-isc-dhcp-leases
- python3-jwt
- python3-loguru
- python3-netifaces
- python3-openssl
- python3-ping3
- python3-pyqt5
- python3-pyqt5.sip
- python3-requests
- python3-scapy
- python3-tabulate
- python3-termcolor
- python3-twisted
- python3-urwid
- wireless-tools
captiveflask
root@kali:~# captiveflask -h
[*] CaptiveFlask v1.0.2 - subtool from wifipumpkin3
usage: captiveflask [-h] [-t TEMPLATE] [-s STATIC] [-r REDIRECT] [-p PORT]
[-rU REDIRECT_URL] [-f FORCE_REDIRECT] [-v VERSION]
CaptiveFlask - Server to create captive portal with flask doc:
https://github.com/mh4x0f/captiveportals
options:
-h, --help show this help message and exit
-t TEMPLATE, --tamplate TEMPLATE
path the theme login captive portal
-s STATIC, --static STATIC
path of the static files from webpage
-r REDIRECT, --redirect REDIRECT
IpAddress from gataway captive portal
-p PORT, --port PORT The port for captive portal
-rU REDIRECT_URL, --redirect-url REDIRECT_URL
Url for redirect after user insert the credentials on
captive portal
-f FORCE_REDIRECT, --force-login_successful-template FORCE_REDIRECT
force redirect to login_successful.html template
-v VERSION, --version VERSION
show version the tool
evilqr3
root@kali:~# evilqr3 -h
[*] EvilQR3 v0.0.1 - subtool from wifipumpkin3
usage: evilqr3 [-h] -t TEMPLATE -s STATIC [-p PORT] [-rU REDIRECT_URL] -sa
SERVER_ADDRESS -mu MATCH_USERAGENT -tp TOKEN_API [-d DEBUG]
[-v VERSION]
EvilQR3 -
options:
-h, --help show this help message and exit
-t TEMPLATE, --tamplate TEMPLATE
path the theme login captive portal
-s STATIC, --static STATIC
path of the static files from webpage
-p PORT, --port PORT The port for captive portal
-rU REDIRECT_URL, --redirect-url REDIRECT_URL
Url for redirect after user insert the credentials on
captive portal
-sa SERVER_ADDRESS, --server-address SERVER_ADDRESS
IpAddress from gataway captive portal
-mu MATCH_USERAGENT, --match-useragent MATCH_USERAGENT
IpAddress from gataway captive portal
-tp TOKEN_API, --token-api TOKEN_API
The token API for make request with security
-d DEBUG, --debug DEBUG
Enable debug mode
-v VERSION, --version VERSION
show version the tool
phishkin3
root@kali:~# phishkin3 -h
[*] phishkin3 v1.0.2 - subtool from wifipumpkin3
usage: phishkin3 [-h] [-r REDIRECT] [-p PORT] [-cU CLOUD_URL]
[-rU REDIRECT_URL] [-v VERSION]
phishkin3 - Server to create captive portal with external phishing page doc:
options:
-h, --help show this help message and exit
-r REDIRECT, --redirect REDIRECT
IpAddress from gataway captive portal
-p PORT, --port PORT The port for captive portal
-cU CLOUD_URL, --cloud-url-phishing CLOUD_URL
cloud url phishing domain page
-rU REDIRECT_URL, --redirect-url REDIRECT_URL
Url for redirect after user insert the credentials on
phishing page
-v VERSION, --version VERSION
show version the tool
sslstrip3
root@kali:~# sslstrip3 -h
sslstrip 0.9 by Moxie Marlinspike (mh4x0f)
Fork: https://github.com/mh4x0f/sslstrip3
Usage: sslstrip <options>
Options:
-w <filename>, --write=<filename> Specify file to log to (optional).
-p , --post Log only SSL POSTs. (default)
-s , --ssl Log all SSL traffic to and from server.
-a , --all Log all SSL and HTTP traffic to and from server.
-l <port>, --listen=<port> Port to listen on (default 10000).
-f , --favicon Substitute a lock favicon on secure requests.
-k , --killsessions Kill sessions in progress.
-t <config>, --tamper <config> Enable response tampering with settings from <config>.
-i , --inject Inject code into HTML pages using a text file.
-h print(this help message.
wifipumpkin3
root@kali:~# wifipumpkin3 -h
usage: wifipumpkin3 [-h] [-i INTERFACE] [-iNet INTERFACE_NET] [-s SESSION]
[-p PULP] [-x XPULP] [-m WIRELESS_MODE] [--no-colors]
[--rest] [--restport RESTPORT] [--username USERNAME]
[--password PASSWORD] [-iNM IG_NETWORKMANAGER]
[-rNM RM_NETWORKMANAGER] [-v]
wifipumpkin3 - Powerful framework for rogue access point attack. See:
https://wifipumpkin3.github.io/docs/getting-started#usage
options:
-h, --help show this help message and exit
-i INTERFACE set interface for create AP
-iNet INTERFACE_NET set interface for share internet to AP
-s SESSION set session for continue attack
-p PULP, --pulp PULP interactive sessions can be scripted with .pulp file
-x XPULP, --xpulp XPULP
interactive sessions can be string with ";" as the
separator
-m WIRELESS_MODE, --wireless-mode WIRELESS_MODE
set wireless mode settings
--no-colors disable terminal colors and effects.
--rest Run the Wp3 RESTful API.
--restport RESTPORT Port to run the Wp3 RESTful API on. default is 1337
--username USERNAME Start the RESTful API with the specified username
instead of pulling from wp3.db
--password PASSWORD Start the RESTful API with the specified password
instead of pulling from wp3.db
-iNM IG_NETWORKMANAGER, --ignore-from-networkmanager IG_NETWORKMANAGER
set interface for ignore from Network-Manager
-rNM RM_NETWORKMANAGER, --remove-from-networkmanager RM_NETWORKMANAGER
remove interface from Network-Manager
-v, --version show program's version number and exit
wp3
root@kali:~# wp3 -h
usage: wp3 [-h] [-i INTERFACE] [-iNet INTERFACE_NET] [-s SESSION] [-p PULP]
[-x XPULP] [-m WIRELESS_MODE] [--no-colors] [--rest]
[--restport RESTPORT] [--username USERNAME] [--password PASSWORD]
[-iNM IG_NETWORKMANAGER] [-rNM RM_NETWORKMANAGER] [-v]
wifipumpkin3 - Powerful framework for rogue access point attack. See:
https://wifipumpkin3.github.io/docs/getting-started#usage
options:
-h, --help show this help message and exit
-i INTERFACE set interface for create AP
-iNet INTERFACE_NET set interface for share internet to AP
-s SESSION set session for continue attack
-p PULP, --pulp PULP interactive sessions can be scripted with .pulp file
-x XPULP, --xpulp XPULP
interactive sessions can be string with ";" as the
separator
-m WIRELESS_MODE, --wireless-mode WIRELESS_MODE
set wireless mode settings
--no-colors disable terminal colors and effects.
--rest Run the Wp3 RESTful API.
--restport RESTPORT Port to run the Wp3 RESTful API on. default is 1337
--username USERNAME Start the RESTful API with the specified username
instead of pulling from wp3.db
--password PASSWORD Start the RESTful API with the specified password
instead of pulling from wp3.db
-iNM IG_NETWORKMANAGER, --ignore-from-networkmanager IG_NETWORKMANAGER
set interface for ignore from Network-Manager
-rNM RM_NETWORKMANAGER, --remove-from-networkmanager RM_NETWORKMANAGER
remove interface from Network-Manager
-v, --version show program's version number and exit
Updated on: 2023-Dec-01