Skip to content

Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & traffic analysis. Evolved from NETREAPER.

License

Notifications You must be signed in to change notification settings

Nerds489/VOIDWAVE

 ▄█    █▄   ▄██████▄   ▄█  ████████▄   ▄█     █▄     ▄████████  ▄█    █▄     ▄████████
███    ███ ███    ███ ███  ███   ▀███ ███     ███   ███    ███ ███    ███   ███    ███
███    ███ ███    ███ ███▌ ███    ███ ███     ███   ███    ███ ███    ███   ███    █▀
███    ███ ███    ███ ███▌ ███    ███ ███     ███   ███    ███ ███    ███  ▄███▄▄▄
███    ███ ███    ███ ███▌ ███    ███ ███     ███ ▀███████████ ███    ███ ▀▀███▀▀▀
███    ███ ███    ███ ███  ███    ███ ███     ███   ███    ███ ███    ███   ███    █▄
███    ███ ███    ███ ███  ███   ▄███ ███ ▄█▄ ███   ███    ███ ███    ███   ███    ███
 ▀██████▀   ▀██████▀  █▀   ████████▀   ▀███▀███▀    ███    █▀   ▀██████▀    ██████████

                    ░▒▓█ THE AIRWAVES BELONG TO THOSE WHO LISTEN █▓▒░

Version License Bash Platform

Offensive Security Framework | 124 Tools | Zero Configuration | Just Works

InstallationQuick StartCommandsTools


What is VOIDWAVE?

VOIDWAVE is an offensive security framework that does the thinking for you. No more manually enabling monitor mode, finding interfaces, scanning for targets, or hunting for clients. Just run the attack — VOIDWAVE handles the rest.

# Old way
airmon-ng check kill
airmon-ng start wlan0
airodump-ng wlan0mon          # wait, watch, copy BSSID...
airodump-ng -c 6 --bssid AA:BB:CC:DD:EE:FF wlan0mon  # find clients...
aireplay-ng --deauth 0 -a AA:BB:CC:DD:EE:FF -c 11:22:33:44:55:66 wlan0mon

# VOIDWAVE way
voidwave wifi deauth          # done

Installation

git clone https://github.com/Nerds489/VOIDWAVE.git
cd VOIDWAVE

# Install VOIDWAVE (system-wide, works with sudo)
sudo ./install.sh

# Or install to ~/.local/bin (user only)
./install.sh --user

# Install security tools (124 tools)
sudo ./install-tools.sh install-all

Quick Start

# Launch interactive menu
sudo voidwave

# Or use direct commands with auto-everything
sudo voidwave wifi deauth     # auto: interface, monitor, AP, client
sudo voidwave wifi capture    # auto: interface, monitor, AP selection
sudo voidwave scan            # auto: discovers local network

Automation

VOIDWAVE automatically handles requirements. No arguments needed — it figures it out:

What You Run What VOIDWAVE Does
voidwave scan Detects local network, runs nmap scan
voidwave wifi status Finds wireless interface, shows mode
voidwave wifi monitor on Selects interface, enables monitor mode
voidwave wifi scan Selects interface, enables monitor, scans APs
voidwave wifi deauth All above + selects AP + finds clients + attacks
voidwave wifi capture All above + captures handshakes to file

How It Works

┌─────────────────────────────────────────────────────────────────────┐
│  1. AUTO-INTERFACE    Find wireless adapters, pick the best one    │
│  2. AUTO-MONITOR      Enable monitor mode if not already on        │
│  3. AUTO-NETWORK      Detect local network for scanning            │
│  4. AUTO-TARGET       Scan and select targets interactively        │
│  5. AUTO-AP           Scan for access points, let you pick         │
│  6. AUTO-CLIENT       Find connected clients on selected AP        │
│  7. AUTO-INSTALL      Install missing tools on the fly             │
└─────────────────────────────────────────────────────────────────────┘

Commands

Network Scanning

voidwave scan                     # auto-detect network, scan it
voidwave scan 192.168.1.0/24      # scan specific target
voidwave scan -t 10.0.0.1         # scan single host

WiFi Operations

voidwave wifi list                # list wireless interfaces
voidwave wifi status              # show interface mode (auto-select)
voidwave wifi monitor on          # enable monitor mode (auto-select)
voidwave wifi monitor off         # disable monitor mode
voidwave wifi scan                # scan for access points
voidwave wifi deauth              # deauth attack (fully automated)
voidwave wifi capture             # capture handshakes

System

voidwave status                   # show system info and tool status
voidwave config show              # show configuration
voidwave config set log_level DEBUG
voidwave wizard first             # first-time setup

Flags

voidwave --help                   # show all commands
voidwave --version                # show version
voidwave --dry-run <cmd>          # preview without executing
voidwave --quiet <cmd>            # suppress output
voidwave --verbose <cmd>          # debug output
voidwave --target <IP> scan       # specify target

Interactive Mode

Launch without arguments for the full menu system:

sudo voidwave
┌─────────────────────────────────────────────────────────────────────┐
│  [1] WIRELESS      WPA/WPA2/WPS/Evil Twin/Deauth/PMKID             │
│  [2] SCANNING      Port scans, service detection, host discovery   │
│  [3] CREDENTIALS   Password cracking, brute force, responder       │
│  [4] OSINT         Email harvesting, subdomain enum, recon         │
│  [5] RECON         Web fuzzing, directory brute force, CMS scans   │
│  [6] TRAFFIC       Packet capture, MITM, ARP spoofing              │
│  [7] EXPLOIT       Metasploit, SQLMap, searchsploit                │
│  [8] STRESS        Load testing, SYN floods                        │
│  [9] STATUS        System info, tool status                        │
│  [0] EXIT                                                          │
└─────────────────────────────────────────────────────────────────────┘

Tool Arsenal

124 security tools across 9 categories:

Wireless

aircrack-ng airmon-ng airodump-ng aireplay-ng reaver bully wifite hcxdumptool hcxtools mdk4 hostapd dnsmasq kismet pixiewps cowpatty wash macchanger iw

Scanning

nmap masscan rustscan zmap enum4linux nbtscan onesixtyone smbclient smbmap ldapsearch snmpwalk nfs-utils

Credentials

hashcat john hydra medusa responder impacket crackmapexec evil-winrm kerbrute patator crowbar thc-pptp-bruter hash-identifier

OSINT

theHarvester subfinder amass recon-ng sherlock holehe spiderfoot maltego shodan censys emailharvester whois dnsrecon fierce dmitry

Recon

gobuster ffuf feroxbuster dirb dirbuster nikto nuclei wpscan whatweb wafw00f httpx httprobe aquatone eyewitness gowitness arjun

Traffic

tcpdump wireshark tshark ettercap bettercap mitmproxy arpspoof dnsspoof sslstrip netsniff-ng

Exploit

metasploit sqlmap searchsploit commix xsser beef-xss social-engineer-toolkit veil empire covenant chisel ligolo-ng

Stress

hping3 slowloris siege ab wrk iperf3 stress-ng t50

Utility

curl wget git proxychains tor socat netcat tmux screen jq yq xxd binwalk foremost steghide exiftool pwncat rlwrap sshpass fcrackzip


Tool Installer

./install-tools.sh list              # show all tools and status
./install-tools.sh install-all       # install everything
./install-tools.sh category wireless # install by category
./install-tools.sh install nmap      # install specific tool
./install-tools.sh search wifi       # search tools

Installation methods: apt dnf pacman zypper apk pipx pip go cargo gem snap flatpak github releases git clone


Supported Distros

Family Distributions
Debian Debian, Ubuntu, Kali, Parrot, Linux Mint
Red Hat Fedora, RHEL, Rocky, AlmaLinux, CentOS
Arch Arch, Manjaro, BlackArch, EndeavourOS
SUSE openSUSE Leap, Tumbleweed
Alpine Alpine Linux
Void Void Linux

Wireless Attacks

Attack Description
WPS Pixie-Dust Offline WPS PIN recovery
WPS Brute Force Online PIN enumeration
WPA Handshake 4-way handshake capture + crack
PMKID Clientless WPA attack
Deauth Client disconnection
Evil Twin Rogue AP with captive portal
Beacon Flood Fake network spam
WEP Legacy encryption attacks

Recommended Adapters

Chipset Driver Injection
Atheros AR9271 ath9k_htc
Ralink RT3070 rt2800usb
Realtek RTL8812AU rtl8812au
MediaTek MT7612U mt76x2u

Configuration

voidwave config show              # all settings
voidwave config get log_level     # get value
voidwave config set key value     # set value
voidwave config reset             # restore defaults
Setting Default Description
log_level INFO DEBUG, INFO, WARNING, ERROR
file_logging true Write logs to file
confirm_dangerous true Prompt before dangerous ops
warn_public_ip true Warn on public IP targets

Requirements

Requirement Details
OS Linux (kernel 4.x+)
Shell Bash 5.0+
Privileges Root for wireless/packet capture
WiFi Adapter Monitor mode + injection (for wireless attacks)

Project Structure

VOIDWAVE/
├── bin/voidwave          # CLI entry point
├── voidwave              # Launcher wrapper
├── lib/                  # Bash libraries
│   ├── automation.sh     # Auto-* functions
│   ├── core.sh           # Core utilities
│   ├── wireless.sh       # Wireless operations
│   ├── detection.sh      # System detection
│   ├── config.sh         # Configuration
│   ├── ui.sh             # Terminal UI
│   ├── menus/            # Interactive menus
│   ├── attacks/          # Attack modules
│   └── intelligence/     # Smart targeting
├── install.sh            # VOIDWAVE installer
└── install-tools.sh      # Tool installer (124 tools)

Legal

For authorized security testing only.

Unauthorized access to computer systems is illegal. You are responsible for ensuring proper authorization before use.

Authorized uses:

  • Penetration testing with written permission
  • Security research on systems you own
  • Educational environments
  • CTF competitions

VOIDWAVE v10.2.2 • Apache-2.0

The airwaves belong to those who listen