Packages and Binaries:

wifipumpkin3

This package contains a powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.

Installed size: 29.24 MB
How to install: sudo apt install wifipumpkin3

Dependencies:
  • hostapd
  • iptables
  • iw
  • net-tools
  • python3
  • python3-aiofiles
  • python3-bs4
  • python3-dhcplib
  • python3-distutils
  • python3-dnslib
  • python3-dnspython
  • python3-flask
  • python3-flask-restful
  • python3-isc-dhcp-leases
  • python3-jwt
  • python3-loguru
  • python3-netifaces
  • python3-openssl
  • python3-ping3
  • python3-pyqt5
  • python3-pyqt5.sip
  • python3-requests
  • python3-scapy
  • python3-tabulate
  • python3-termcolor
  • python3-twisted
  • python3-urwid
  • wireless-tools
captiveflask
root@kali:~# captiveflask -h
[*] CaptiveFlask v1.0.2 - subtool from wifipumpkin3
usage: captiveflask [-h] [-t TEMPLATE] [-s STATIC] [-r REDIRECT] [-p PORT]
                    [-rU REDIRECT_URL] [-f FORCE_REDIRECT] [-v VERSION]

CaptiveFlask - Server to create captive portal with flask doc:
https://github.com/mh4x0f/captiveportals

options:
  -h, --help            show this help message and exit
  -t TEMPLATE, --tamplate TEMPLATE
                        path the theme login captive portal
  -s STATIC, --static STATIC
                        path of the static files from webpage
  -r REDIRECT, --redirect REDIRECT
                        IpAddress from gataway captive portal
  -p PORT, --port PORT  The port for captive portal
  -rU REDIRECT_URL, --redirect-url REDIRECT_URL
                        Url for redirect after user insert the credentials on
                        captive portal
  -f FORCE_REDIRECT, --force-login_successful-template FORCE_REDIRECT
                        force redirect to login_successful.html template
  -v VERSION, --version VERSION
                        show version the tool

evilqr3
root@kali:~# evilqr3 -h
[*] EvilQR3 v0.0.1 - subtool from wifipumpkin3
usage: evilqr3 [-h] -t TEMPLATE -s STATIC [-p PORT] [-rU REDIRECT_URL] -sa
               SERVER_ADDRESS -mu MATCH_USERAGENT -tp TOKEN_API [-d DEBUG]
               [-v VERSION]

EvilQR3 -

options:
  -h, --help            show this help message and exit
  -t TEMPLATE, --tamplate TEMPLATE
                        path the theme login captive portal
  -s STATIC, --static STATIC
                        path of the static files from webpage
  -p PORT, --port PORT  The port for captive portal
  -rU REDIRECT_URL, --redirect-url REDIRECT_URL
                        Url for redirect after user insert the credentials on
                        captive portal
  -sa SERVER_ADDRESS, --server-address SERVER_ADDRESS
                        IpAddress from gataway captive portal
  -mu MATCH_USERAGENT, --match-useragent MATCH_USERAGENT
                        IpAddress from gataway captive portal
  -tp TOKEN_API, --token-api TOKEN_API
                        The token API for make request with security
  -d DEBUG, --debug DEBUG
                        Enable debug mode
  -v VERSION, --version VERSION
                        show version the tool

phishkin3
root@kali:~# phishkin3 -h
[*] phishkin3 v1.0.2 - subtool from wifipumpkin3
usage: phishkin3 [-h] [-r REDIRECT] [-p PORT] [-cU CLOUD_URL]
                 [-rU REDIRECT_URL] [-v VERSION]

phishkin3 - Server to create captive portal with external phishing page doc:

options:
  -h, --help            show this help message and exit
  -r REDIRECT, --redirect REDIRECT
                        IpAddress from gataway captive portal
  -p PORT, --port PORT  The port for captive portal
  -cU CLOUD_URL, --cloud-url-phishing CLOUD_URL
                        cloud url phishing domain page
  -rU REDIRECT_URL, --redirect-url REDIRECT_URL
                        Url for redirect after user insert the credentials on
                        phishing page
  -v VERSION, --version VERSION
                        show version the tool

sslstrip3
root@kali:~# sslstrip3 -h

sslstrip 0.9 by Moxie Marlinspike (mh4x0f)
Fork: https://github.com/mh4x0f/sslstrip3
Usage: sslstrip <options>

Options:
-w <filename>, --write=<filename> Specify file to log to (optional).
-p , --post                       Log only SSL POSTs. (default)
-s , --ssl                        Log all SSL traffic to and from server.
-a , --all                        Log all SSL and HTTP traffic to and from server.
-l <port>, --listen=<port>        Port to listen on (default 10000).
-f , --favicon                    Substitute a lock favicon on secure requests.
-k , --killsessions               Kill sessions in progress.
-t <config>, --tamper <config>    Enable response tampering with settings from <config>.
-i , --inject                     Inject code into HTML pages using a text file.
-h                                print(this help message.


wifipumpkin3
root@kali:~# wifipumpkin3 -h
usage: wifipumpkin3 [-h] [-i INTERFACE] [-iNet INTERFACE_NET] [-s SESSION]
                    [-p PULP] [-x XPULP] [-m WIRELESS_MODE] [--no-colors]
                    [--rest] [--restport RESTPORT] [--username USERNAME]
                    [--password PASSWORD] [-iNM IG_NETWORKMANAGER]
                    [-rNM RM_NETWORKMANAGER] [-v]

wifipumpkin3 - Powerful framework for rogue access point attack. See:
https://wifipumpkin3.github.io/docs/getting-started#usage

options:
  -h, --help            show this help message and exit
  -i INTERFACE          set interface for create AP
  -iNet INTERFACE_NET   set interface for share internet to AP
  -s SESSION            set session for continue attack
  -p PULP, --pulp PULP  interactive sessions can be scripted with .pulp file
  -x XPULP, --xpulp XPULP
                        interactive sessions can be string with ";" as the
                        separator
  -m WIRELESS_MODE, --wireless-mode WIRELESS_MODE
                        set wireless mode settings
  --no-colors           disable terminal colors and effects.
  --rest                Run the Wp3 RESTful API.
  --restport RESTPORT   Port to run the Wp3 RESTful API on. default is 1337
  --username USERNAME   Start the RESTful API with the specified username
                        instead of pulling from wp3.db
  --password PASSWORD   Start the RESTful API with the specified password
                        instead of pulling from wp3.db
  -iNM IG_NETWORKMANAGER, --ignore-from-networkmanager IG_NETWORKMANAGER
                        set interface for ignore from Network-Manager
  -rNM RM_NETWORKMANAGER, --remove-from-networkmanager RM_NETWORKMANAGER
                        remove interface from Network-Manager
  -v, --version         show program's version number and exit

wp3
root@kali:~# wp3 -h
usage: wp3 [-h] [-i INTERFACE] [-iNet INTERFACE_NET] [-s SESSION] [-p PULP]
           [-x XPULP] [-m WIRELESS_MODE] [--no-colors] [--rest]
           [--restport RESTPORT] [--username USERNAME] [--password PASSWORD]
           [-iNM IG_NETWORKMANAGER] [-rNM RM_NETWORKMANAGER] [-v]

wifipumpkin3 - Powerful framework for rogue access point attack. See:
https://wifipumpkin3.github.io/docs/getting-started#usage

options:
  -h, --help            show this help message and exit
  -i INTERFACE          set interface for create AP
  -iNet INTERFACE_NET   set interface for share internet to AP
  -s SESSION            set session for continue attack
  -p PULP, --pulp PULP  interactive sessions can be scripted with .pulp file
  -x XPULP, --xpulp XPULP
                        interactive sessions can be string with ";" as the
                        separator
  -m WIRELESS_MODE, --wireless-mode WIRELESS_MODE
                        set wireless mode settings
  --no-colors           disable terminal colors and effects.
  --rest                Run the Wp3 RESTful API.
  --restport RESTPORT   Port to run the Wp3 RESTful API on. default is 1337
  --username USERNAME   Start the RESTful API with the specified username
                        instead of pulling from wp3.db
  --password PASSWORD   Start the RESTful API with the specified password
                        instead of pulling from wp3.db
  -iNM IG_NETWORKMANAGER, --ignore-from-networkmanager IG_NETWORKMANAGER
                        set interface for ignore from Network-Manager
  -rNM RM_NETWORKMANAGER, --remove-from-networkmanager RM_NETWORKMANAGER
                        remove interface from Network-Manager
  -v, --version         show program's version number and exit

Updated on: 2023-Dec-01