Wireless "swiss knife" that bundles multiple workflows into one menu-driven tool.
The main entry point is swiss_knife.py. Control the chaos with
Lab5.
- Recon - passive discovery of nearby APs/clients
- Deauth - network deauthentication workflow
- Portal - phishing-style portal with logging
- Evil Twin - rogue AP + portal workflow
- Bluetooth - BT scan workflow
- Handshaker - PCAP capture + 4-way EAPOL validation
- Dragon Drain - single-target WPA3 attack
- ARP scan - ARP table discovery (IP/MAC/OUI vendor)
- IP.CAM finder - camera discovery by Wi-Fi OUI + LAN neighbor scan
- WiFi Poet - SSID beacon spam (chaos/custom mode)
Karma - rogue AP auto-responder(🚧 under construction 🚧)
git clone https://github.com/D3h420/SwissKnife
cd SwissKnife
sudo chmod +x swiss_knife.py
python3 swiss_knife.pyRun as root (required for wireless operations). The menu lets you choose which attack to run and guides you through the steps.
Captive Portal and Evil Twin store captured submissions in log/ (created on
first run). Filenames are based on the selected SSID.
Portal files are stored in html/. You can add your own custom portals there.
- Linux + Python 3 + root access
- Wi-Fi adapter(s) that support monitor mode (recommended: dedicated attack adapter)
- Runtime Python dependency:
scapy(launcher checks/installs automatically when possible)
Debian/Ubuntu quick install:
sudo apt update
sudo apt install -y aircrack-ng iproute2 ethtool arp-scan hostapd dnsmasq iptables bluez rfkill wireless-tools network-manager avahi-daemon bullyNotes:
- Dragon Drain has its own in-module installer/build flow.
richis optional (only for prettier output in selected modules).
If you want vendor names in recon results, add an OUI file at modules/oui.txt
Use only on networks you own or have explicit permission to test.
/LAB5/