Powerful framework for rogue access point attack.
Go to file
2020-04-17 08:34:21 -03:00
.github added patreon on github sponsor 2020-04-15 23:25:42 -03:00
bin changed check is rootuser for use on github actions deploy 2020-04-15 19:26:24 -03:00
config fixed disable security auth wireless by default 2020-04-15 20:54:29 -03:00
docs added initial logo design tool on README.md 2020-04-13 16:54:44 -03:00
exceptions added exceptions implementation error 2020-04-09 12:24:44 -03:00
helps added enable security WPA,WEP, WPA2 mode wireless 2020-04-04 19:42:35 -03:00
logs restore folder logs from .gitignore 2020-04-15 19:42:33 -03:00
scripts added news pulp templates on scripts 2020-04-16 20:44:32 -03:00
tests added code formarter black tool 2020-04-12 20:26:30 -03:00
wifipumpkin3 added autocomplete on command restore 2020-04-14 15:54:40 -03:00
.gitattributes added .js gitatteibutes try to fix bug linguistics 2020-04-10 01:05:07 -03:00
.gitignore restore folder logs from .gitignore 2020-04-15 19:42:33 -03:00
CHANGELOG.md fixed typo name on readme.md 2020-04-17 08:34:21 -03:00
CONTRIBUTING.md stable version that contains 2020-04-15 14:58:18 -03:00
Dockerfile fixed dependency of wireless-tools for use iwconfig command 2020-04-14 11:43:23 -03:00
ISSUE_TEMPLATE.md added ISSUE_TEMPLATE.md on project 2020-04-16 20:37:43 -03:00
LICENSE.md build the package wifipumpkin3 2020-03-01 21:51:33 -03:00
makefile added file manifast.in 2020-04-13 21:26:34 -03:00
MANIFEST.in added file manifast.in 2020-04-13 21:26:34 -03:00
README.md fixed typo name on readme.md 2020-04-17 08:34:21 -03:00
requirements-dev.txt added depedency PyQt5-sip==12.7.2 to requirements.txt 2020-04-15 20:22:44 -03:00
requirements.txt added depedency PyQt5-sip==12.7.2 to requirements.txt 2020-04-15 20:22:44 -03:00
setup.py force copy all files config to user_config_dir 2020-04-14 21:58:19 -03:00

Wifipumpkin3

Wp3

Powerful framework for rogue access point attack.

build status license changelog changelog code style

Overview

wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.

Main Features

  • Rogue access point attack
  • Man-in-the-middle attack
  • Rouge Dns Server
  • Captive portal attack (captiveflask)
  • Intercept, inspect, modify and replay web traffic
  • WiFi networks scanning
  • DNS monitoring service
  • Credentials harvesting
  • Transparent Proxies
  • LLMNR, NBT-NS and MDNS poisoner (Responder3)
  • and more!

Donation

Patreon:

patreon

paypal:

donate

Via BTC:

1HBXz6XX3LcHqUnaca5HRqq6rPUmA3pf6f

Supported platforms

  • Python: you need Python 3.7 or later to run Wp3.
⚠️ NOTE: The Wp3 require hostapd installed by default
  • Operating System:
    • a recent version of Linux (we tested on Ubuntu 18.04 LTS);
    • please note: Windows is not supported.

Installation & Documentation

Learn more about using wp3 on the official site!

Contributing

See CONTRIBUTING.md for how to help out.

License

Wp3 is licensed under the Apche 2.0.