Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked wifipumpkin3 v1.0.8 R1 - Powerful framework for rogue access point attack


itsMe

Recommended Posts


This is the hidden content, please

wifipumpkin3 is a powerful framework for rogue access point attack, written in Python, that allows and offers to security researchers, red teamers, and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.wifipumpkin3

Main Features

    Rogue access point attack
    Man-in-the-middle attack
    Rogue Dns Server
    Captive portal attack (captiveflask)
    Intercept, inspect, modify and replay web traffic
    WiFi networks scanning
    DNS monitoring service
    Credentials harvesting
    Transparent Proxies
    LLMNR, NBT-NS, and MDNS poisoner (Responder3)
    and more!

Changelog v1.0.8 R1

Added

    added inactivity poll default value to 60 min #67
    added check if process hostapd is running before start threads
    added settings binary path of iptables editable
    added waitforfinish on Qprocess for add rules iptables
    added frist restful api implementation
    added DHCP command to select the dhcp server configuration
    added stop all modules with the command stop or exit is running
    added new module for performing dns spoof attack with AP enable

Removed

    removed dependencies that be standard library #105

Fixed

    fixed hide error object of type QProcess on WorkProcess class #93
    fixed settings dhcp for allow to change dhcp configuration
    fixed error when execute from github actions
    fixed set restport by default 1337
    fixed process init hostapd duplicated
    fixed clean code and code format improves
    fixed github actions error when try to run pytests
    fixed dhcp command for apply configurations on same session

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.