Airstrike Features

Platform Overview

Airstrike is a Flask + Socket.IO web interface that orchestrates Wi-Fi assessment tooling directly from your browser. It keeps the UI simple, the API stable, and the code paths lean so you can focus on running proven wireless attacks without juggling dozens of terminals.

Focused Attack Surface

This build intentionally spotlights the three most stable operations in the suite:

Everything else—experimental stubs, half-finished modules—was intentionally removed to keep operators on a predictable, regression-tested workflow.

Browser-driven Workflow

After launching sudo python run.py, browse to http://airstrike.local:5000:

  1. Scan tab discovers nearby networks and shows adapter state.
  2. Attack tab exposes configuration panels for the active scenario.
  3. Results streams real-time Socket.IO logs and stores captures under captures/<BSSID>.

Ops-ready Defaults

Repository Layout

Lab-first Disclaimer

Airstrike is intended for lab use, red-team exercises, and research on networks you own or are explicitly authorized to assess. Misuse may violate law or policy—operate responsibly and document authorization for every engagement.