ACCESS POINT KILLER

Table of contents:

General Information

Acces Point Killer was only for my personal help, i have not found a working tool that deauthenticate all access points(AP) out of network. After some researching i began to write this little script-tool. The AP killer automatically changing your mac address at the setup, then it checks if you have enabled mon-interface or not. It will detect if you are already in monitor mode or not. You can enable it manually before you are starting the script. This tool is an linux CLI tool, which only works on Linux and not Termux or other phone platforms.

Changelog

In Progress:

Version 0.6

  • Option to skip background scanning
  • Automatic executing dis.sh

Already leaked versions:

Version 0.5

  • Added dis.sh
  • Fixed some errors
  • Added resetting spoofed mac after exit

Version 0.4

Version: 0.3

  • Added to except to start main.sh
  • Added if option above is denied, asking to disable monitor mode
  • Added CTRL+C after starting deauthing
  • Added disabling monitor mode after aborting attack

Version: 0.2:

  • Added option to add interface
  • Added interface detection

[BETA] Version 0.1:

  • Added 2 methods to attack
  • Added MAC changer

Access Point Flooder

This is a script that flood all channels in your range with access points. The script is more for trolling people, you can still use it if you can. You can use own word for SSIDs. SSID = Name of WiFi.

The script will read the file ~/ap_killer/wordlist.txt so you can add manually, generate or skip it.

Manualy:

Script will prompt a gedit file, type any name upto 10 characters and save it with ctrl+s, close it with alt+f4.

Automatically:

User will enter count of words, then it generates words and using them.

Skipping:

If you have already a file inside there, then it will skip.

How To Use:

chmod +x fakeap.sh

Run Script:

./fakeap.sh <interface>

Example

./fakeap.sh wlan0mon

Disclaimer

Use this tool for purposes only .:-) 🕵️‍♂️ If you do any illegal attacks, i am not responsible for your tasks. Use this tool correctly, and do not re-upload it on your github repository without permissions.

Installation

You can use any linux you want.

git clone https://github.com/ViperZCrew/ap_killer.git

cd ap_killer && chmod +x *.sh

Getting interface you searching for:

ifconfig | grep wlan | awk '{print $1} | tr -d :'

It should give you an output Note: Some laptops are using WiFi without ethernet, so wlan0 will be available, but some laptops have not monitor mode.

Using Tool at attack:

./setup.sh <interface>

For example:

./setup.sh wlan1

main.sh is the main script but do not start it because then setup.sh enable the monitor mode and mac spoofer. Make sure you have killed all networking processes, and close firefox or any internet application.

Afterwards Attack

After attack run the dis(abling monitor mode).sh, enter your already setuped monitor mode interface and wait until the script has been completed. Function:

  • Disabling Spoofed MAC
  • Disabling Monitor Mode
  • Restarting Network Processes

Run:

./dis.sh

Credits

  • Credits: ViperZCrew - MrBlackX

Social Media

Telegram:

  • @MrBlackX
  • @On1c0n3
  • @rebl0x3r

Join us at telegram: https://t.me/rebl0x3r

Bug Report

If you found any bug or issue, pless go here You can also request an update.