Airstrike Attack Modules

Airstrike intentionally focuses on the three Wi-Fi attacks that proved stable across labs and field engagements. Each module has its own Python worker inside attacks/ and exposes status, logs, and captures through Socket.IO.

Deauthentication

Use this module to eject clients from an AP by flooding crafted 802.11 deauth frames.

Handshake Capture + Cracking

Captures WPA/WPA2 handshakes and immediately launches aircrack-ng with the configured wordlist.

Evil Twin

Clones a target SSID using hostapd/dnsmasq, stands up DHCP/DNS spoofing, and can optionally display your captive portal.

Workflow Tips

  1. Scan for targets, confirming signal strength and channel stability.
  2. Run the desired attack while watching the Results tab for live logs.
  3. Download artifacts (PCAPs, cracked keys) from captures/<BSSID>.

Have ideas to enhance these modules? Open an issue or pull request on GitHub with logs, adapter info, and reproduction notes.