Wifiphisher icon
Wifiphisher icon

Wifiphisher

Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to...

Wifiphisher screenshot 1

Cost / License

  • Free
  • Open Source

Platforms

  • Linux
-
No reviews
0likes
0comments
0news articles

Features

Suggest and vote on features
  1.  Phishing

 Tags

  • phishing-attack
  • hacker-tools
  • attack
  • man-in-the-middle

Wifiphisher News & Activities

Highlights All activities

Recent activities

No activities found.

Wifiphisher information

  • Licensing

    Open Source (GPL-3.0) and Free product.
  • Written in

  • Alternatives

    2 alternatives listed
  • Supported Languages

    • English

GitHub repository

  •  14,307 Stars
  •  2,718 Forks
  •  346 Open Issues
  •   Updated  
View on GitHub

Popular alternatives

View all
Wifiphisher was added to AlternativeTo by Paul on and this page was last updated .
No comments or reviews, maybe you want to be first?
Post comment/review

What is Wifiphisher?

Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.

Wifiphisher is...

...powerful. Wifiphisher can run for hours inside a Raspberry Pi device executing all modern Wi-Fi association techniques (including "Evil Twin", "KARMA" and "Known Beacons").

...flexible. Supports dozens of arguments and comes with a set of community-driven phishing templates for different deployment scenarios.

...modular. Users can write simple or complicated modules in Python to expand the functionality of the tool or create custom phishing scenarios in order to conduct specific target-oriented attacks.

...easy to use. Advanced users can utilize the rich set of features that Wifiphisher offers but beginners may start out as simply as "./bin/wifiphisher". The interactive Textual User Interface guides the tester through the build process of the attack.

...the result of an extensive research. Attacks like "Known Beacons" and "Lure10" as well as state-of-the-art phishing techniques, were disclosed by our developers, and Wifiphisher was the first tool to incorporate them.

...supported by an awesome community of developers and users.

...free. Wifiphisher is available for free download, and also comes with full source code that you may study, change, or distribute under the terms of the GPLv3 license.

Official Links