-
Notifications
You must be signed in to change notification settings - Fork 58
Client Sniff And Deauth
7h30th3r0n3 edited this page Jan 2, 2025
·
2 revisions
Based on an original idea from evilsocket the pwnagotchi
You absolutely must see the original project here from which I took inspiration:
https://github.com/evilsocket/pwnagotchi
- AP: Number of APs near you
- C : Current Channel
- H : Numbers of new PCAP created ( at least one EAPOL and beacon frame)
- E : Numbers of EAPOL packets captures
- D : 0 = no deauth only sniffing / 1 = active deauth
- DF: Fast Mode
M5Core2 :
Left Button : ON/OFF deauth
middle : back to menu
right Button : Fast/slow mode
Cardputer:
D : ON/OFF deauth
Backspace: back to menu
F : Fast/slow mode
Cycle trough :
- Scan for near AP
- Sniff if client is connected
- Send broadcast deauth frame to each AP which have client
- Send spoofed deauth frame for each client
- Sniff EAPOL at same time
- Loop at Scan near AP
- Scan WiFi
- Select WiFi
- Clone & Details
- Captive Portal Management
- Check Credential
- Probes Attack
- Sniffing Probes
- Karma Attack
- Automated Karma Attack
- Karma Spear
- Bluetooth Serial Control
- Wardriving
- Wardriving Master
- Beacon Spam
- Deauther
- Handshake Master
- WiFi Raw Sniffing
- Sniff Raw Client
- WiFi Channel Visualizer
- Client Sniff And Deauth
- EAPOL/Deauth Detection
- Wall Of Flipper
- Send Tesla Code with RFunit
- SSH Shell
- Scan Network and Port
- Full Network Scan
- Web Crawler
- PwnGridSpam
- Skimmer Detector
- BadUSB
- Bluetooth Keyboard
- Reverse TCP Tunnel
- DHCP Starvation Attack
- Rogue DHCP Server
- Switch DNS
- Network Hijacking
- Printer Attack
- Custom Theming