Powerful framework for rogue access point attack.
Go to file
2020-05-10 20:43:39 -03:00
.github
bin changed structure of all plugins and proxies 2020-05-09 20:01:19 -03:00
config
docs
exceptions
helps added helps for all available commands 2020-05-09 19:51:09 -03:00
logs
scripts
tests added new implementation for load native extensions 2020-05-09 20:02:20 -03:00
wifipumpkin3 fixed DHCP offer Apple device can’t connect to ap #32 2020-05-10 20:43:39 -03:00
.gitattributes
.gitignore
CHANGELOG.md fixed DHCP offer Apple device can’t connect to ap #32 2020-05-10 20:43:39 -03:00
CONTRIBUTING.md
Dockerfile
ISSUE_TEMPLATE.md
LICENSE.md
makefile
MANIFEST.in
README.md
requirements-dev.txt
requirements.txt
setup.py

Wifipumpkin3

Wp3

Powerful framework for rogue access point attack.

build status license changelog changelog code style

Overview

wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.

Main Features

  • Rogue access point attack
  • Man-in-the-middle attack
  • Rogue Dns Server
  • Captive portal attack (captiveflask)
  • Intercept, inspect, modify and replay web traffic
  • WiFi networks scanning
  • DNS monitoring service
  • Credentials harvesting
  • Transparent Proxies
  • LLMNR, NBT-NS and MDNS poisoner (Responder3)
  • and more!

Donation

Patreon:

patreon

paypal:

donate

Via BTC:

1HBXz6XX3LcHqUnaca5HRqq6rPUmA3pf6f

Supported platforms

  • Python: you need Python 3.7 or later to run Wp3.
⚠️ NOTE: The Wp3 require hostapd installed by default
  • Operating System:
    • a recent version of Linux (we tested on Ubuntu 18.04 LTS);
    • please note: Windows is not supported.

Installation & Documentation

Learn more about using wp3 on the official site!

Contributing

See CONTRIBUTING.md for how to help out.

community

on discord: https://discord.gg/jywYskR

License

Wp3 is licensed under the Apche 2.0.