WEF: WiFi Exploitation Framework

WEF – WiFi Exploitation Framework

This project started over 2021 as a personal tool to easily audit networks without writing long commands or setting all values one by one, in order to automate the whole processes. This is not a professional tool, this project was created to learn about wireless security and for testing purposes. This is a fully offensive framework to audit wifi networks with different types of attacks for WPA/WPA2, WPS and WEP, automated handshake cracking and much more.

Attacks

  • Deauthentication attack
  • WIDS Confusion attack
  • Authentication attack
  • Beacon Flood attack
  • TKIP attack (Michael Shutdown Exploitation)
  • Pixie Dust attack
  • Null Pin attack
  • PIN Bruteforce attack
  • ARP Replay attack
  • HIRTE attack
  • Caffe Latte attack
  • Fake Authentication attack
  • WPA/WPA2 handshake capture attack (passively)
  • PMKID attack
  • Evil Twin attack

This attacks are explained here on the Wiki

Feature

☑️ WPA/WPA2, WPS and WEP Attacks

☑️ Automatic handshake capture and cracking

☑️ Multiple templates for EvilTwin attack (different languages)

☑️ Enable/disable monitor mode and view interface info (frequencies, chipset, MAC…)

☑️ 2.4 GHz and 5 GHz supported

☑️ Informative attack logs (just done user side)

☑️ Custom wordlist selector when cracking handshakes

☑️ English and spanish supported

And much more

Install & Use