Skip to content

An automated bash script for Wi-Fi password brute-forcing.

Notifications You must be signed in to change notification settings

anonfaded/wifade

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Wifade

An automated bash script for Wi-Fi password brute-forcing, designed to seamlessly unlock network secrets across linux and macOS

GitHub all releases


📱 Screenshot

⬇️ Download

Download the linux and macOS scripts from the releases page.

Features

  • Automated password testing on multiple SSIDs.
  • Simple configuration of target SSIDs and passwords.
  • (Future versions may include password dictionary support.)

How It Works

The script systematically attempts to connect to Wi-Fi networks using a list of passwords. For Linux, it employs the escape key to dismiss any authentication dialogs, ensuring uninterrupted operation.

Getting Started

Prerequisites

  • A Linux or macOS system with bash support.
  • Necessary network permissions for ethical testing.

Before using Wifade, ensure you have the necessary package installed to enable the escape key functionality for dismissing authentication dialogs on Linux:

  • Install xdotool for simulating key presses:
sudo apt-get install xdotool

After installing xdotool, follow the installation instructions below for Wifade to set up the script on your system.

Installation

Clone the repository:

git clone https://github.com/anonfaded/wifade.git

Navigate to the WiFade directory:

cd wifade

Make the script executable:

chmod +x linux-script.sh

Usage

Run the script from your terminal:

  1. For linux version of script:
./linux-script.sh
  1. For macOS version of script:
./macOS-script.sh

Configuration

Add the SSIDs you want to test in the ssid.txt file:

nano ssid.txt
Anonymous

Specify the password file with the -w switch:

./linux-script.sh -s ssid.txt -w /path/to/file.txt

If no password file is provided, the script will use the default passwords.txt file.

Script Execution

Once initiated, the script begins its operation. Simply observe the terminal output; if the correct password is discovered, it will be highlighted in color alongside a success message.

Contributions

Contributions are welcome! If you're interested in improving Wifade or adding new features, feel free to fork the repository, make your changes, and submit a pull request.

Issues and macOS Testing

If you encounter any issues while using this script, especially with macOS, as it has not been extensively tested on this platform, please don't hesitate to open an issue on GitHub. When reporting, kindly include detailed information about the problem and the context in which it occurs to help us make improvements. Your feedback and contributions are highly appreciated as they help enhance the tool's reliability and functionality across different environments.

Disclaimer

This tool is intended for educational purposes and ethical security testing only. Always ensure you have explicit permission to test network security to avoid legal repercussions.