![Wp3](data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI5NiIgaGVpZ2h0PSIxMDI0IiB2aWV3Qm94PSIwIDAgOTYgMTAyNCI+PHJlY3Qgd2lkdGg9IjEwMCUiIGhlaWdodD0iMTAwJSIgZmlsbD0iI2NmZDRkYiIvPjwvc3ZnPg==)
Powerful framework for rogue access point attack.
![code style](data:image/gif;base64,R0lGODdhAQABAPAAAMPDwwAAACwAAAAAAQABAAACAkQBADs=)
![AKUANDUBA](data:image/gif;base64,R0lGODdhAQABAPAAAMPDwwAAACwAAAAAAQABAAACAkQBADs=)
wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.
- Rogue access point attack
- Man-in-the-middle attack
- Module for deauthentication attack
- Module for extra-captiveflask templates
- Rogue Dns Server
- Captive portal attack (captiveflask)
-
Intercept, inspect, modify and replay web traffic
-
WiFi networks scanning
-
DNS monitoring service
- Credentials harvesting
- Phishkin3 (Support MFA phishing attack via captive portal)
- EvilQR3 (Support Phishing QR code attack)
- Transparent Proxies
- RestFulAPI (new)
- and more!
![patreon](data:image/gif;base64,R0lGODdhAQABAPAAAMPDwwAAACwAAAAAAQABAAACAkQBADs=)
![donate](data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI5MiIgaGVpZ2h0PSIyNiIgdmlld0JveD0iMCAwIDkyIDI2Ij48cmVjdCB3aWR0aD0iMTAwJSIgaGVpZ2h0PSIxMDAlIiBmaWxsPSIjY2ZkNGRiIi8+PC9zdmc+)
1HBXz6XX3LcHqUnaca5HRqq6rPUmA3pf6f
-
Python: you need Python 3.8 or later to run Wp3.
⚠️ NOTE: The Wp3 require hostapd installed by default |
---|
-
Operating System:
- a recent version of Linux (we tested on Ubuntu 22.04 LTS);
- please note: Windows is not supported.
Installation & Documentation
Learn more about using wp3 on the official site!
See CONTRIBUTING.md for how to help out.
community
on discord: https://discord.gg/jywYskR
Wp3 is licensed under the Apache 2.0.