Skip to content

D3h420/SwissKnife

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

201 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CAA34C68-2185-46F5-BA61-2F88DF8FEC73

SwissKnife 🧰

Wireless "swiss knife" that bundles multiple workflows into one menu-driven tool. The main entry point is swiss_knife.py. Control the chaos with Lab5.

Functions ✨

  • Recon - passive discovery of nearby APs/clients
  • Deauth - network deauthentication workflow
  • Portal - phishing-style portal with logging
  • Evil Twin - rogue AP + portal workflow
  • Bluetooth - BT scan workflow
  • Handshaker - PCAP capture + 4-way EAPOL validation
  • Dragon Drain - single-target WPA3 attack
  • ARP scan - ARP table discovery (IP/MAC/OUI vendor)
  • IP.CAM finder - camera discovery by Wi-Fi OUI + LAN neighbor scan
  • WiFi Poet - SSID beacon spam (chaos/custom mode)
  • Karma - rogue AP auto-responder (🚧 under construction 🚧)

Quick start ⚡

git clone https://github.com/D3h420/SwissKnife
cd SwissKnife
sudo chmod +x swiss_knife.py
python3 swiss_knife.py

Run as root (required for wireless operations). The menu lets you choose which attack to run and guides you through the steps.

Logs and captures 🧾

Captive Portal and Evil Twin store captured submissions in log/ (created on first run). Filenames are based on the selected SSID.

HTML portals 🎨

Portal files are stored in html/. You can add your own custom portals there.

Requirements 🧩

  • Linux + Python 3 + root access
  • Wi-Fi adapter(s) that support monitor mode (recommended: dedicated attack adapter)
  • Runtime Python dependency: scapy (launcher checks/installs automatically when possible)

Debian/Ubuntu quick install:

sudo apt update
sudo apt install -y aircrack-ng iproute2 ethtool arp-scan hostapd dnsmasq iptables bluez rfkill wireless-tools network-manager avahi-daemon bully

Notes:

  • Dragon Drain has its own in-module installer/build flow.
  • rich is optional (only for prettier output in selected modules).

Recon vendor lookup (optional)

If you want vendor names in recon results, add an OUI file at modules/oui.txt

Legal note ⚠️

Use only on networks you own or have explicit permission to test.

/LAB5/

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors