Airstrike’s Flask + Socket.IO UI sits on top of trusted CLI tooling, letting you start, stop, and monitor Wi-Fi attacks without juggling multiple terminals.
The attack suite focuses on the three scenarios we rely on most—Deauthentication, Handshake capture + cracking, and Evil Twin—keeping the workflow lean and reliable.
The documentation walks you through creating a virtualenv, installing requirements.txt, and running sudo python run.py so you can be testing in minutes.
Every module, config file, and workflow is covered inside the docs—requirements, configuration, attack usage, troubleshooting, and disclaimers are all in one place.
Report bugs or propose enhancements via GitHub—the project roadmap is driven by red-team operators sharing logs, adapters, and real-world feedback.