- General Information
- Changelog
- Access Point Flooder
- Installation
- Disclaimer
- Credits
- Social Media
- Bug Report
Acces Point Killer was only for my personal help, i have not found a working tool that deauthenticate all access points(AP) out of network. After some researching i began to write this little script-tool. The AP killer automatically changing your mac address at the setup, then it checks if you have enabled mon-interface or not. It will detect if you are already in monitor mode or not. You can enable it manually before you are starting the script. This tool is an linux CLI tool, which only works on Linux and not Termux or other phone platforms.
Version 0.6
- Option to skip background scanning
- Automatic executing
dis.sh
Version 0.5
- Added dis.sh
- Fixed some errors
- Added resetting spoofed mac after exit
Version 0.4
- Added Access Point Flood script see more here
Version: 0.3
- Added to except to start main.sh
- Added if option above is denied, asking to disable monitor mode
- Added CTRL+C after starting deauthing
- Added disabling monitor mode after aborting attack
Version: 0.2:
- Added option to add interface
- Added interface detection
[BETA] Version 0.1:
- Added 2 methods to attack
- Added MAC changer
This is a script that flood all channels in your range with access points. The script is more for trolling people, you can still use it if you can. You can use own word for SSIDs. SSID = Name of WiFi.
The script will read the file ~/ap_killer/wordlist.txt
so you can add manually, generate or skip it.
Manualy:
Script will prompt a gedit file, type any name upto 10 characters and save it with ctrl+s, close it with alt+f4.
Automatically:
User will enter count of words, then it generates words and using them.
Skipping:
If you have already a file inside there, then it will skip.
How To Use:
chmod +x fakeap.sh
Run Script:
./fakeap.sh <interface>
Example
./fakeap.sh wlan0mon
Use this tool for purposes only .:-) 🕵️♂️ If you do any illegal attacks, i am not responsible for your tasks. Use this tool correctly, and do not re-upload it on your github repository without permissions.
You can use any linux you want.
git clone https://github.com/ViperZCrew/ap_killer.git
cd ap_killer && chmod +x *.sh
Getting interface you searching for:
ifconfig | grep wlan | awk '{print $1} | tr -d :'
It should give you an output Note: Some laptops are using WiFi without ethernet, so wlan0 will be available, but some laptops have not monitor mode.
Using Tool at attack:
./setup.sh <interface>
For example:
./setup.sh wlan1
main.sh
is the main script but do not start it because then setup.sh enable the monitor mode and mac spoofer.
Make sure you have killed all networking processes, and close firefox or any internet application.
Afterwards Attack
After attack run the dis
(abling monitor mode).sh
, enter your already setuped monitor mode interface and
wait until the script has been completed.
Function:
- Disabling Spoofed MAC
- Disabling Monitor Mode
- Restarting Network Processes
Run:
./dis.sh
- Credits: ViperZCrew - MrBlackX
Telegram:
- @MrBlackX
- @On1c0n3
- @rebl0x3r
Join us at telegram: https://t.me/rebl0x3r
If you found any bug or issue, pless go here You can also request an update.