{"id":14036870,"url":"https://github.com/kimocoder/wifite2","last_synced_at":"2025-07-27T04:32:35.979Z","repository":{"id":37514702,"uuid":"217207690","full_name":"kimocoder/wifite2","owner":"kimocoder","description":"Rewrite of the popular wireless network auditor, \"wifite\" - original by @derv82","archived":false,"fork":true,"pushed_at":"2024-04-18T00:11:02.000Z","size":215466,"stargazers_count":829,"open_issues_count":14,"forks_count":142,"subscribers_count":47,"default_branch":"master","last_synced_at":"2024-04-18T13:17:56.494Z","etag":null,"topics":["aircrack-ng","bully","cowpatty","hashcat","hcxtools","john","kali-linux","nethunter","reaver","tshark","wifite2"],"latest_commit_sha":null,"homepage":"https://github.com/derv82/wifite2","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":"derv82/wifite2","license":"gpl-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/kimocoder.png","metadata":{"files":{"readme":"README.md","changelog":"changelog","contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2019-10-24T03:58:42.000Z","updated_at":"2024-04-18T06:46:54.000Z","dependencies_parsed_at":null,"dependency_job_id":null,"html_url":"https://github.com/kimocoder/wifite2","commit_stats":null,"previous_names":[],"tags_count":24,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/kimocoder%2Fwifite2","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/kimocoder%2Fwifite2/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/kimocoder%2Fwifite2/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/kimocoder%2Fwifite2/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/kimocoder","download_url":"https://codeload.github.com/kimocoder/wifite2/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":227762312,"owners_count":17816008,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["aircrack-ng","bully","cowpatty","hashcat","hcxtools","john","kali-linux","nethunter","reaver","tshark","wifite2"],"created_at":"2024-08-12T03:02:17.342Z","updated_at":"2025-07-27T04:32:35.967Z","avatar_url":"https://github.com/kimocoder.png","language":"Python","funding_links":[],"categories":["Python"],"sub_categories":[],"readme":"[![GitHub version](https://img.shields.io/badge/version-2.7.2-informational.svg)](#)\n[![GitHub issues](https://img.shields.io/github/issues/kimocoder/wifite2.svg)](https://github.com/kimocoder/wifite2/issues)\n[![GitHub forks](https://img.shields.io/github/forks/kimocoder/wifite2.svg)](https://github.com/kimocoder/wifite2/network)\n[![GitHub stars](https://img.shields.io/github/stars/kimocoder/wifite2.svg)](https://github.com/kimocoder/wifite2/stargazers)\n[![Android Supported](https://img.shields.io/badge/Android-Supported-green.svg)](#)\n[![GitHub license](https://img.shields.io/github/license/kimocoder/wifite2.svg)](https://github.com/kimocoder/wifite2/blob/master/LICENSE)\n\n\nWifite\n======\n\nThis repo is a complete re-write of [`wifite`](https://github.com/derv82/wifite), a Python script for auditing wireless networks.\n\nWifite runs existing wireless-auditing tools for you. Stop memorizing command arguments \u0026 switches!\n\nWifite is designed to use all known methods for retrieving the password of a wireless access point (router).  These methods include:\n1. WPS: The [Offline Pixie-Dust attack](https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup#Offline_brute-force_attack)\n1. WPS: The [Online Brute-Force PIN attack](https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup#Online_brute-force_attack)\u003cbr\u003e\n   WPS: The [Offline NULL PIN attack](https://github.com/t6x/reaver-wps-fork-t6x/wiki/Introducing-a-new-way-to-crack-WPS:-Option--p-with-an-Arbitrary-String)\n2. WPA: The [WPA Handshake Capture](https://hashcat.net/forum/thread-7717.html) + offline crack.\n3. WPA: The [PMKID Hash Capture](https://hashcat.net/forum/thread-7717.html) + offline crack.\n4. WEP: Various known attacks against WEP, including *fragmentation*, *chop-chop*, *aireplay*, etc.\n5. WIFI Signal jammer, block specific accesspoints or multiple.\n   signal jamming only works for specific Atheros WiFi chipsets. \n\nRun wifite, select your targets, and Wifite will automatically start trying to capture or crack the password.\n\nSupported Operating Systems\n---------------------------\nWifite is designed specifically for the latest version of [**Kali** Linux](https://www.kali.org/). [ParrotSec](https://www.parrotsec.org/) is also supported.\n\nNetHunter (Android) is also widely supported by wifite, but it will require a custom kernel with modules support and various\npatches for injection in order to work. Tested on Android 10 (Q), Android 11 (R),  Android 12 (S) and Android 13 (T)\n\nMore information regarding [ Android: **NetHunter** ](https://gitlab.com/kalilinux/nethunter) is found there and\nyou should also take a look at the [ **NetHunter WIKI** ](https://www.kali.org/docs/nethunter/) which is more up to date then [ NetHunter.com ](https://nethunter.com).\n\nOther pen-testing distributions (such as BackBox or Ubuntu) have outdated versions of the tools used by Wifite. Do not expect support unless you are using the latest versions of the *Required Tools*, and also [patched wireless drivers that support injection]().\n\nRequired Tools\n--------------\nFirst and foremost, you will need a wireless card capable of \"Monitor Mode\" and packet injection (see [this tutorial for checking if your wireless card is compatible](https://www.aircrack-ng.org/doku.php?id=compatible_cards) and also [this guide](https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup#Offline_brute-force_attack)). There are many cheap wireless cards that plug into USB available from online stores.\n\nSecond, only the latest versions of these programs are supported and must be installed for Wifite to work properly:\n\n**Required:**\n\n* Suggest using `python3` as `python2` was marked deprecated as of january 2020.\n* As we moved from older python and changed to fully support and run on `python3.11`\n* [`Iw`](https://wireless.wiki.kernel.org/en/users/documentation/iw): For identifying wireless devices already in Monitor Mode.\n* [`Ip`](https://packages.debian.org/buster/net-tools): For starting/stopping wireless devices.\n* [`Aircrack-ng`](https://aircrack-ng.org/) suite, includes:\n   * [`airmon-ng`](https://tools.kali.org/wireless-attacks/airmon-ng): For enumerating and enabling Monitor Mode on wireless devices.\n   * [`aircrack-ng`](https://tools.kali.org/wireless-attacks/aircrack-ng): For cracking WEP .cap files and WPA handshake captures.\n   * [`aireplay-ng`](https://tools.kali.org/wireless-attacks/aireplay-ng): For deauthing access points, replaying capture files, various WEP attacks.\n   * [`airodump-ng`](https://tools.kali.org/wireless-attacks/airodump-ng): For target scanning \u0026 capture file generation.\n   * [`packetforge-ng`](https://tools.kali.org/wireless-attacks/packetforge-ng): For forging capture files.\n\n**Optional, but Recommended:**\n\n* [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html): For detecting WPS networks and inspecting handshake capture files.\n* [`reaver`](https://github.com/t6x/reaver-wps-fork-t6x): For WPS Pixie-Dust \u0026 brute-force attacks.\n   * Note: Reaver's `wash` tool can be used to detect WPS networks if `tshark` is not found.\n* [`bully`](https://github.com/aanarchyy/bully): For WPS Pixie-Dust \u0026 brute-force attacks.\n   * Alternative to Reaver. Specify `--bully` to use Bully instead of Reaver.\n   * Bully is also used to fetch PSK if `reaver` cannot after cracking WPS PIN.\n* [`john`](https://www.openwall.com/john): For CPU (OpenCL)/GPU cracking passwords fast.\n* [`coWPAtty`](https://tools.kali.org/wireless-attacks/cowpatty): For detecting handshake captures.\n* [`hashcat`](https://hashcat.net/): For cracking PMKID hashes.\n   * [`hcxdumptool`](https://github.com/ZerBea/hcxdumptool): For capturing PMKID hashes.\n   * [`hcxpcapngtool`](https://github.com/ZerBea/hcxtools): For converting PMKID packet captures into `hashcat`'s format.\n\n\n\nInstall dependencies\n--------------------\nEither, do it the proper python way with\n\n```sh\n$ python3 -m venv venv\n$ source venv/bin/activate\n$ pip3 install -r requirements.txt\n```\n\n## Install Wifite\n\nTo install Wifite, run:\n\n```sh\ngit clone https://github.com/kimocoder/wifite2.git\ncd wifite2\nsudo python3 setup.py install\n```\n\n## Run Wifite\n\nTo run Wifite, simply execute:\n\n```sh\nsudo wifite\n```\n\n\n\nBrief Feature List\n------------------\n* [PMKID hash capture](https://hashcat.net/forum/thread-7717.html) (enabled by-default, force with: `--pmkid`)\n* WPS Offline Brute-Force Attack aka \"Pixie-Dust\". (enabled by-default, force with: `--wps-only --pixie`)\n* WPS Online Brute-Force Attack aka \"PIN attack\". (enabled by-default, force with: `--wps-only --no-pixie`)\n* WPA/2 Offline Brute-Force Attack via 4-Way Handshake capture (enabled by-default, force with: `--no-wps`)\n* Validates handshakes against `tshark`, `cowpatty`, and `aircrack-ng` (when available)\n* Various WEP attacks (replay, chopchop, fragment, hirte, p0841, caffe-latte)\n* Automatically decloaks hidden access points while scanning or attacking.\n   * Note: Only works when channel is fixed. Use `-c \u003cchannel\u003e`\n   * Disable this using `--no-deauths`\n* 5Ghz support for some wireless cards (via `-5` switch).\n   * Note: Some tools don't play well on 5GHz channels (e.g. `aireplay-ng`)\n* Stores cracked passwords and handshakes to the current directory (`--cracked`)\n   * Includes information about the cracked access point (Name, BSSID, Date, etc).\n* Easy to try to crack handshakes or PMKID hashes against a wordlist (`--crack`)\n\nTIP! Use `wifite.py -h -v` for a collection of switches and settings\nfor your own customization, automation, timers and so on ..\n\nWhat's new?\n-----------\nComparing this repo to the \"old wifite\" @ https://github.com/derv82/wifite\n\n* **Less bugs**\n   * Cleaner process management. Does not leave processes running in the background (the old `wifite` was bad about this).\n   * No longer \"one monolithic script\". Has working unit tests. Pull requests are less-painful!\n* **Speed**\n   * Target access points are refreshed every second instead of every 5 seconds.\n* **Accuracy**\n   * Displays realtime Power level of currently-attacked target.\n   * Displays more information during an attack (e.g. % during WEP chopchop attacks, Pixie-Dust step index, etc)\n* **Educational**\n   * The `--verbose` option (expandable to `-vv` or `-vvv`) shows which commands are executed \u0026 the output of those commands.\n   * This can help debug why Wifite is not working for you. Or so you can learn how these tools are used.\n* More-actively developed, with some help from the awesome open-source community.\n* Python 3 support.\n* Sweet new ASCII banner.\n\nWhat's gone?\n------------\n* Some command-line arguments (`--wept`, `--wpst`, and other confusing switches).\n   * You can still access some of these obscure options, try `wifite -h -v`\n\nWhat's not new?\n---------------\n* (Mostly) Backwards compatible with the original `wifite`'s arguments.\n* Same text-based interface everyone knows and loves.\n\nScreenshots\n-----------\n\nNetHunter Android 13 (S) scanning for targets / target information\n![Scanning for targets](https://i.imgur.com/IzXweSH.jpg)\n\n-------------\n\nCracking WPS PIN using `reaver`'s Pixie-Dust attack, then fetching WPA key using `bully`:\n![Pixie-Dust with Reaver to get PIN and Bully to get PSK](https://i.imgur.com/Q5KSDbg.gif)\n\n-------------\n\nCracking WPA key using PMKID attack:\n![PMKID attack](https://i.imgur.com/CR8oOp0.gif)\n\n-------------\n\nDecloaking \u0026 cracking a hidden access point (via the WPA Handshake attack):\n![Decloaking and Cracking a hidden access point](https://i.imgur.com/F6VPhbm.gif)\n\n-------------\n\nCracking a weak WEP password (using the WEP Replay attack):\n![Cracking a weak WEP password](https://i.imgur.com/jP72rVo.gif)\n\n-------------\n\nCracking a pre-captured handshake using John The Ripper (via the `--crack` option):\n![--crack option](https://i.imgur.com/iHcfCjp.gif)\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fkimocoder%2Fwifite2","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fkimocoder%2Fwifite2","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fkimocoder%2Fwifite2/lists"}