{"id":26398458,"url":"https://github.com/flashnuke/wifi-deauth","last_synced_at":"2025-04-07T15:05:15.868Z","repository":{"id":64744563,"uuid":"533045268","full_name":"flashnuke/wifi-deauth","owner":"flashnuke","description":"A deauth attack that disconnects all devices from the target wifi network (2.4Ghz \u0026 5Ghz) ","archived":false,"fork":false,"pushed_at":"2025-03-21T18:39:59.000Z","size":153,"stargazers_count":517,"open_issues_count":12,"forks_count":59,"subscribers_count":14,"default_branch":"main","last_synced_at":"2025-03-24T13:04:27.040Z","etag":null,"topics":["deauth","deauthentication-attack","deauther","denial-of-service","denial-of-service-attack","dos","dos-attack","kali-linux","pentest","pentesting","pentesting-tools","security","security-tools","wifi","wifi-attack","wifi-deauth","wifi-deauther","wifi-security","wireless-network"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/flashnuke.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2022-09-05T20:09:22.000Z","updated_at":"2025-03-24T08:03:44.000Z","dependencies_parsed_at":"2024-07-18T18:04:21.698Z","dependency_job_id":"768c2064-4ca6-4948-aaf5-200ea3d601d9","html_url":"https://github.com/flashnuke/wifi-deauth","commit_stats":null,"previous_names":[],"tags_count":12,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/flashnuke%2Fwifi-deauth","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/flashnuke%2Fwifi-deauth/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/flashnuke%2Fwifi-deauth/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/flashnuke%2Fwifi-deauth/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/flashnuke","download_url":"https://codeload.github.com/flashnuke/wifi-deauth/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247675597,"owners_count":20977376,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["deauth","deauthentication-attack","deauther","denial-of-service","denial-of-service-attack","dos","dos-attack","kali-linux","pentest","pentesting","pentesting-tools","security","security-tools","wifi","wifi-attack","wifi-deauth","wifi-deauther","wifi-security","wireless-network"],"created_at":"2025-03-17T12:30:39.773Z","updated_at":"2025-04-07T15:05:15.836Z","avatar_url":"https://github.com/flashnuke.png","language":"Python","readme":"![image](https://user-images.githubusercontent.com/59119926/196630355-9edfa98f-7c97-4555-b882-73a0cc87744c.png)\n\u003c/br\u003e\nA DoS attack that disconnects all devices from a target wifi network.\n* The network's password is not required\n* Tested on Kali NetHunter (Snapshot at the bottom)\n\n\n**IMPORTANT** \u003c/br\u003e\nIn some occasions, network APs might operate on both 5GHz and 2.4GHz under the same BSSID/SSID name. \u003cbr\u003e\nIn order to truly bring the AP down, I usually run simultaneously two de-authers using 2 network interfaces: one for 2.4GHz and one for 5GHz. \u003c/br\u003e\n| Bandwidth | Channel range |\n|----------|---------------|\n| 2.4 GHz   | 1 \u003c--\u003e 14     |\n| 5 GHz     | 35 \u003c--\u003e 165   |\n\n## How it works\n\u003cimg src=\"https://github.com/flashnuke/wifi-deauth/assets/59119926/26f75cce-0484-4949-840e-d23fa976ff9b\" width=\"480\"\u003e\n\nThe program iterates over all possible channels, and by sniffing `802.11` packets it determines which access points are available. \u003c/br\u003e\nAfter the attacker chooses a target access point to attack, the program:\n1. Continously sends spoofed deauthentication packets using broadcast mac address as the destination\n2. Starts sniffing for clients that are connected to the AP by filtering for certain 802.11 packet frames and sending spoofed deauthentication packets to those clients in addition to the broadcast address\n\n\n# Usage\n#### Installing on the system\n```bash\ngit clone https://github.com/flashnuke/wifi-deauth.git\ncd wifi-deauth\nsudo pip3 install .\nsudo wifi-deauth -i \u003ciface\u003e\n```\n\n#### Running without installing \n```bash\ngit clone https://github.com/flashnuke/wifi-deauth.git\ncd wifi-deauth\nsudo pip3 install -r requirements.txt # install requirements manually\ncd wifi_deauth\nsudo python3 wifi_deauth.py -i \u003ciface\u003e\n```\n\n### Usage notes\n*  `\u003ciface\u003e` is the name of the network interface (i.e `wlan0` or `eth0`) that supports packet injection\n* `--deauth-all-channels` - try this option if the attack doesn't work (see more in [Optional Arguments](https://github.com/flashnuke/wifi-deauth/tree/main?tab=readme-ov-file#optional-arguments))\n* `--autostart` is good for automation - first make sure that only 1 access point is found, you can use filters (bssid, ssid, channels, etc...) to ensure that\n* The initial iteration over all channels might take a minute or two (depends on how many bands the interface supports)\n\n### Optional arguments\n* `--deauth-all-channels` - send de-auth packets on all allowed channels (or all custom channels if `--channels` is set) iteratively, effective against access points that switch to a different channel as a protection mechanism\n* `--ssid \u003cname\u003e` - filter for a specific SSID by a case-insensitive substring (this should shorten the channel-scanning duration), whitespaces should be passed with an escape character (i.e -\u003e `new\\ york`)\n* `--bssid \u003caddr\u003e` - filter for a specific BSSID (the access point's MAC address), case in-sensitive\n* `--autostart` - start the de-auth loop automatically, works only when one access point is found\n* `--channels \u003cch1,ch2\u003e` - scan for specific channels only, otherwise all supported channels will be scanned\n* `--clients \u003cm_addr1,m_addr2\u003e` - target only specific clients to disconnect from the AP, otherwise all connected clients will be targeted (note: using this option disables deauth broadcast)\n* `--debug` - enable debug prints\n* `--kill` (or run `sudo systemctl stop NetworkManager`) - kill NetworkManager service which might interfere with the attack\n* `--skip-monitormode` - enable monitor mode manually (otherwise the program does it automatically)\n\n### Misc notes\n* Setting custom client mac addresses (`--clients`) is not suggested, as some clients might reconnect using a random MAC address which is different than the one set\n* Check `ifconfig` to find the interface nickname\n* Works for 2.4GHhz and 5Ghz\n\n### Requirements\n* Linux OS\n* A network adapter that supports monitor mode and packet injection\n* Scapy library (listed in `requirements.txt`)\n\n# Deadnet \u0026 other projects\nFeel free to check out my other projects, the most recent one being [mod-rootkit](https://github.com/flashnuke/mod-rootkit), which is a Linux kernel-level rootkit designed to hide files, processes, and network activity.\n\nThere's another project ([deadnet](https://github.com/flashnuke/deadnet)) that performs a DoS attack on networks, which requires credentials but quite effective nonetheless.\n\n# Disclaimer\n\nThis tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. I assume no liability and am not responsible for any misuse or damage caused by this tool and software.\n\nDistributed under the GNU License.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fflashnuke%2Fwifi-deauth","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fflashnuke%2Fwifi-deauth","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fflashnuke%2Fwifi-deauth/lists"}