Welcome to SpyEye, an advanced Hybrid Network Attack Framework. This tool helps you understand network security by separating Python control from a hardware-accelerated ESP32 Probe. Use it for tasks such as deauthentication and PMKID attacks.
Before you start, ensure your system meets these requirements:
- Operating System: Windows, macOS, or Linux
- RAM: 4 GB or more
- Storage: At least 200 MB of free space
- Python: Version 3.7 or newer
- ESP32 Module: Required for hardware functions
- Network Orchestration: Manage network attacks efficiently.
- Social Engineering Capabilities: Simulate phishing scenarios for educational purposes.
- Deauth Attack Functionality: Disconnect devices from a Wi-Fi network.
- PMKID Attacks: Capture WPA2 handshakes for analysis.
- User-Friendly Interface: Designed for ease of use.
To download SpyEye, visit this page to download: SpyEye Releases.
- Click on the "Releases" link above.
- Find the latest version.
- Download the appropriate file for your operating system.
After downloading, follow these steps to install SpyEye:
- Extract the ZIP file: Unzip the downloaded file to a directory of your choice.
- Install Requirements: Open a terminal or command prompt in the extracted folder. Run:
pip install -r requirements.txt - Connect ESP32: If you're using the hardware features, connect your ESP32 module to your computer via USB.
- Run the Application: Use this command:
python main.py
SpyEye offers various features for testing network security. Hereβs how to use some of the key functionalities:
- Open the application.
- Select the network you want to target from the list.
- Set the desired attack parameters.
- Click "Start Attack" to begin.
- Start the application.
- Select the option for PMKID Capture.
- Choose the target network and device.
- Follow on-screen instructions to initiate the capture.
If you encounter any issues or have questions about using SpyEye, refer to the community forums or open an issue in the GitHub repository for assistance.
SpyEye aims to educate users in network security and ethical hacking. Always use the tool responsibly and ensure you have permission to perform any tests.
For updates and announcements, follow us on GitHub.