Powerful framework for rogue access point attack.
Go to file
2020-04-13 16:54:44 -03:00
bin
config
docs added initial logo design tool on README.md 2020-04-13 16:54:44 -03:00
exceptions
helps
scripts
tests
wifipumpkin3
.gitattributes
.gitignore
CHANGELOG.md added initial logo design tool on README.md 2020-04-13 16:54:44 -03:00
CONTRIBUTING.md
Dockerfile
LICENSE.md
makefile fixed makefile option to clean setup.py 2020-04-12 20:28:40 -03:00
README.md added initial logo design tool on README.md 2020-04-13 16:54:44 -03:00
requirements-dev.txt
requirements.txt
setup.py

Wifipumpkin3

Wp3

Powerful framework for rouge access point attack.

license changelog changelog code style

Overview

wifipumpkin3 is powerful framework for rouge access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.

Main Features

  • Rogue access point attack
  • Man-in-the-middle attack
  • Rouge Dns Server
  • Captive portal attack (captiveflask)
  • Intercept, inspect, modify and replay web traffic
  • WiFi networks scanning
  • DNS monitoring service
  • Credentials harvesting
  • Transparent Proxies
  • LLMNR, NBT-NS and MDNS poisoner (Responder3)
  • and more!

Donation

paypal:

donate

Via BTC:

1HBXz6XX3LcHqUnaca5HRqq6rPUmA3pf6f

Supported platforms

  • Python: you need Python 3.7 or later to run Wp3.
⚠️ NOTE: The Wp3 require hostapd installed by default
  • Operating System:
    • a recent version of Linux (we tested on Ubuntu 18.04 LTS);
    • please note: Windows is not supported.

Installation & Documentation

Learn more about using wp3 on the official site!

Contributing

See CONTRIBUTING.md for how to help out.

License

Wp3 is licensed under the Apche 2.0.