WEF: Wi-Fi Exploitation Framework
WiFi Exploitation Framework
This tool is designed for security researchers and penetration testers to analyze and exploit vulnerabilities in Wi-Fi networks. It provides an intuitive interface with a wide range of automated and manual attack techniques to test WPA/WPA2, WPS, and WEP security. With support for both 2.4 GHz and 5 GHz networks, detailed logging and customizable attack options, it offers flexibility for different testing scenarios. This is not a professional tool.
SUPPORTED ATTACKS:
- DoS (optional handshake capture):
- Deauthentication attack
- WIDS Confusion attack
- Authentication attack
- Beacon Flood attack
- TKIP attack (Michael Shutdown Exploitation)
- WPS:
- Pixie Dust attack
- PIN Bruteforce attack
- Null Pin attack
- WEP:
- ARP Replay attack
- HIRTE attack
- Caffe Latte attack
- Fake Authentication attack
- Handshake:
- WPA handshake capture (without deauth)
- PMKID attack (clientless)
- Pwnagotchi mode
- Rogue AP:
- Evil Twin attack
- BSSID spoofing
- Karma mode
- Enterprise WPA supported
- Deauth supported
- Evil Twin attack
- Other attacks:
- Automatic attack mode (Auto PWN)
- WPA3 dictionary attack
All the mentioned attacks/techniques are explained here on the Wiki
FEATURES:
☑️ WPA/WPA2, WPS, WEP, Rogue-AP, and Handshake Attacks
☑️ Automatic attack mode based on the features of the AP
☑️ Automatic handshake capture
☑️ Online and offline handshake cracking
☑️ Simple login template for Evil Twin attack (different languages)
☑️ Enable/disable monitor mode and view information about the network interface (frequencies, chipset, MAC…)
☑️ 2.4 GHz and 5 GHz supported
☑️ Informative reports using HTML templates
☑️ English and spanish supported
Install & Use
Copyright (C) 2022 D3Ext