Convert Figma logo to code with AI

pi-pwnbox-rogueap logovsairgeddon logo

Pi-pwnbox-rogueap vs Airgeddon

Detailed comparison of features, pros, cons, and usage

Pi-pwnbox-rogueap is a specialized Raspberry Pi-based rogue access point toolkit, while airgeddon is a more comprehensive multi-use bash script for auditing wireless networks; pi-pwnbox-rogueap offers a dedicated hardware solution but is less flexible, whereas airgeddon provides broader functionality across different systems but may require more setup and configuration.

Pi-pwnbox-rogueap

Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap :bulb:

1,922
Airgeddon

This is a multi-use bash script for Linux systems to audit wireless networks.

7,072

pi-pwnbox-rogueap logoPi-pwnbox-rogueap Pros and Cons

Pros

  • Provides a comprehensive set of tools for wireless penetration testing and network security auditing
  • Designed specifically for Raspberry Pi, making it a portable and cost-effective solution
  • Includes automated setup scripts, simplifying the installation and configuration process
  • Supports various wireless attack techniques, including rogue access points and man-in-the-middle attacks

Cons

  • May be used for malicious purposes if not handled responsibly
  • Requires technical knowledge to use effectively, which may be challenging for beginners
  • Could potentially interfere with legitimate wireless networks if not used carefully
  • May not be legal to use in certain jurisdictions or without proper authorization

airgeddon logoAirgeddon Pros and Cons

Pros

  • Comprehensive Wi-Fi auditing tool: airgeddon offers a wide range of features for wireless network security testing, making it a versatile tool for penetration testers and security researchers.

  • Active development: The project is regularly updated and maintained, ensuring compatibility with the latest wireless technologies and security standards.

  • User-friendly interface: Despite its powerful capabilities, airgeddon provides a relatively easy-to-use interface, making it accessible to both beginners and advanced users.

  • Extensive documentation: The repository includes detailed documentation and a wiki, helping users understand and utilize the tool's features effectively.

Cons

  • Potential for misuse: As with any powerful security tool, airgeddon could be used maliciously by individuals with harmful intentions.

  • Limited cross-platform support: The tool is primarily designed for Linux-based systems, which may limit its accessibility for users of other operating systems.

  • Dependency on external tools: airgeddon relies on various external tools and dependencies, which may complicate the installation process and increase the potential for compatibility issues.

  • Legal and ethical considerations: Users must be cautious about using the tool in compliance with local laws and regulations, as unauthorized network testing can be illegal in many jurisdictions.

pi-pwnbox-rogueap logoPi-pwnbox-rogueap Code Examples

Rogue AP Setup

This snippet demonstrates how to set up a Rogue Access Point using the project's scripts:

sudo ./1_rogueap_setup.sh wlan0 wlan1 MyEvilAP
sudo ./2_rogueap_captiveportal.sh
sudo ./3_rogueap_start.sh

Capturing Credentials

The following code shows how to capture and display credentials from the captive portal:

def display_credentials():
    with open('/tmp/credentials.txt', 'r') as f:
        creds = f.readlines()
    for cred in creds:
        print(cred.strip())

while True:
    display_credentials()
    time.sleep(5)

Wi-Fi Deauthentication Attack

This snippet illustrates how to perform a Wi-Fi deauthentication attack using the project's tools:

sudo ./wifi_deauth.sh wlan0 00:11:22:33:44:55 FF:FF:FF:FF:FF:FF 0

airgeddon logoAirgeddon Code Examples

Wireless Interface Selection

This snippet demonstrates how the script allows users to select a wireless interface for performing attacks:

function select_interface() {
    debug_print

    if [ ${#wireless_interfaces[@]} -eq 1 ]; then
        interface=${wireless_interfaces[0]}
        echo -e "${green_color}Only one wireless interface detected. Using ${interface}${normal_color}"
        return 0
    fi

    echo -e "${green_color}Select the wireless interface to use:${normal_color}"
    i=0
    for item in "${wireless_interfaces[@]}"; do
        echo -e "${green_color}$i) ${item}${normal_color}"
        i=$((i + 1))
    done
}

Evil Twin Attack Setup

This snippet shows how the script sets up an Evil Twin attack:

function et_setup() {
    debug_print

    if [[ "${current_menu}" != "evil_twin_attacks" ]]; then
        return 1
    fi

    echo
    language_strings "${language}" 91 "title"
    language_strings "${language}" 296 "green"
    echo
    language_strings "${language}" 297 "yellow"
    language_strings "${language}" 298 "yellow"
    echo
}

Handshake Capture

This snippet illustrates the process of capturing a WPA handshake:

function capture_handshake() {
    debug_print

    rm -rf "${tmpdir}handshake"* > /dev/null 2>&1
    recalculate_windows_sizes
    manage_output "+j -bg \"#000000\" -fg \"#FF0000\" -geometry ${g1_topright_window} -T \"Capturing Handshake\"" "airodump-ng -c ${channel} --bssid ${bssid} -w \"${tmpdir}handshake\" ${interface}" "Capturing Handshake" "active"
    if [ "${AIRGEDDON_WINDOWS_HANDLING}" = "xterm" ]; then
        et_xterm_pid=$!
    fi
}

pi-pwnbox-rogueap logoPi-pwnbox-rogueap Quick Start

Installation

  1. Clone the repository:

    git clone https://github.com/koutto/pi-pwnbox-rogueap.git
    
  2. Change to the project directory:

    cd pi-pwnbox-rogueap
    
  3. Install the required dependencies:

    sudo apt-get update
    sudo apt-get install -y hostapd dnsmasq iptables
    

Basic Usage

  1. Configure the settings: Edit the config.ini file to set your desired network name, password, and other options.

  2. Run the setup script:

    sudo python3 setup.py
    
  3. Start the rogue access point:

    sudo python3 rogue_ap.py
    

Example

Here's a basic example of how to create a rogue access point named "Free WiFi" with no password:

  1. Edit the config.ini file:

    [AccessPoint]
    ssid = Free WiFi
    password = 
    channel = 6
    interface = wlan0
    
  2. Run the setup and start the access point:

    sudo python3 setup.py
    sudo python3 rogue_ap.py
    

This will create an open Wi-Fi network named "Free WiFi" on channel 6 using the wlan0 interface.

airgeddon logoAirgeddon Quick Start

Installation

  1. Clone the repository:

    git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git
    
  2. Change to the airgeddon directory:

    cd airgeddon
    
  3. Make the script executable:

    chmod +x airgeddon.sh
    

Basic Usage

  1. Run the script with root privileges:

    sudo ./airgeddon.sh
    
  2. Follow the on-screen menu to select your desired attack or tool.

Example: Scanning for Wi-Fi Networks

  1. From the main menu, select option 1 for "Explore for targets".
  2. Choose your wireless interface from the list.
  3. Wait for the scan to complete and view the results.

Requirements

Ensure you have the following dependencies installed:

  • Bash (>= 4.2)
  • Wireless tools (iwconfig, ifconfig, etc.)
  • Aircrack-ng suite
  • xterm
  • curl

You can install most of these on Debian-based systems using:

sudo apt-get install aircrack-ng curl xterm

For a complete list of dependencies and compatibility, refer to the official documentation.

Top Related Projects

The Rogue Access Point Framework

Pros of Wifiphisher

  • User-friendly with a simple command-line interface
  • Supports multiple attack vectors and phishing scenarios
  • Actively maintained with regular updates

Cons of Wifiphisher

  • Limited to Wi-Fi attacks, less versatile than Pi-pwnbox-rogueap or Airgeddon
  • Requires more manual configuration compared to Airgeddon's guided approach
  • May have compatibility issues with certain wireless adapters

Code Comparison

Wifiphisher (Python):

def start(self):
    initial_checks.check_root()
    initial_checks.check_dependencies()
    self.network_manager.start()
    self.template_manager = phishingpage.TemplateManager()
    self.access_point = accesspoint.AccessPoint()

Airgeddon (Bash):

function initialize_script_settings() {
    debug_mode=0
    language_strings
    initialize_colors
    initialize_script_fonts
    set_default_values
}

Pi-pwnbox-rogueap (Bash):

setup_network_manager() {
    systemctl stop NetworkManager
    systemctl disable NetworkManager
    systemctl mask NetworkManager
}
View More

DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3

Pros of WiFi-Pumpkin

  • User-friendly graphical interface for easier operation
  • Extensive set of built-in attack modules and plugins
  • Cross-platform compatibility (Linux, macOS, Windows)

Cons of WiFi-Pumpkin

  • Less frequently updated compared to airgeddon
  • May require more system resources due to GUI
  • Fewer community contributions and extensions

Code Comparison

WiFi-Pumpkin (Python):

class PumpkinProxy(ProxyPlugin):
    def __init__(self):
        super(PumpkinProxy, self).__init__('pumpkinproxy')
        self.reactor = None

pi-pwnbox-rogueap (Bash):

start_hostapd() {
    hostapd /etc/hostapd/hostapd.conf > /dev/null 2>&1 &
    sleep 2
}

airgeddon (Bash):

function set_interface_mode() {
    if [ "${1}" = "monitor" ]; then
        ${airmon} start "${interface}" > /dev/null 2>&1
    fi
}

WiFi-Pumpkin offers a more structured, object-oriented approach with its Python codebase, while pi-pwnbox-rogueap and airgeddon utilize Bash scripting for system-level operations. airgeddon's code appears more modular and function-based compared to pi-pwnbox-rogueap's straightforward script structure.

View More
5,353

Fluxion is a remake of linset by vk496 with enhanced functionality.

Pros of Fluxion

  • User-friendly interface with a more polished look and feel
  • Specialized in social engineering attacks against Wi-Fi networks
  • Supports multiple languages for wider accessibility

Cons of Fluxion

  • More limited in scope compared to pi-pwnbox-rogueap and airgeddon
  • May require more setup and dependencies for certain features
  • Less frequently updated than airgeddon

Code Comparison

Fluxion

#!/usr/bin/env bash
source lib/InterfaceUtils.sh
source lib/ColorUtils.sh
source lib/LanguageUtils.sh

airgeddon

#!/usr/bin/env bash
source "$AIRGEDDON_PATH/known_pins.txt"
source "$AIRGEDDON_PATH/language_strings.sh"
source "$AIRGEDDON_PATH/plugins.sh"

pi-pwnbox-rogueap

#!/usr/bin/env python3
from core.Utils import *
from core.Bcolors import *
from core.Menu import *

Fluxion focuses on bash scripting with modular source files, similar to airgeddon. pi-pwnbox-rogueap uses Python, offering a different approach to structuring the project. airgeddon appears to have more extensive plugin support, while Fluxion and pi-pwnbox-rogueap have more specialized functionality. All three projects emphasize modularity and organization in their code structure.

View More

This is a multi-use bash script for Linux systems to audit wireless networks.

Pros of airgeddon

  • More comprehensive wireless auditing toolkit with a wider range of attack options
  • Active development and regular updates
  • Large community support and extensive documentation

Cons of airgeddon

  • Steeper learning curve due to more complex features
  • Requires more system resources compared to simpler tools

Code Comparison

airgeddon:

function check_xterm_installed() {
    debug_print

    if ! hash xterm 2>/dev/null; then
        echo_error "xterm is not installed. Install it and try again"
        exit_code=1
        exit_script_option
    fi
}

pi-pwnbox-rogueap:

def check_dependencies():
    for dep in DEPENDENCIES:
        if not shutil.which(dep):
            print(f"[!] {dep} is not installed. Please install it and try again.")
            sys.exit(1)

Summary

airgeddon offers a more feature-rich and actively maintained wireless auditing toolkit compared to pi-pwnbox-rogueap. It provides a wider range of attack options and benefits from strong community support. However, this comes at the cost of a steeper learning curve and higher resource requirements. The code comparison shows different approaches to dependency checking, with airgeddon using bash functions and pi-pwnbox-rogueap utilizing Python.

View More
1,095

*DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM

Pros of mana

  • More comprehensive set of attack tools and techniques
  • Better documentation and setup instructions
  • Active development and community support

Cons of mana

  • Steeper learning curve for beginners
  • Requires more system resources
  • Less focused on Raspberry Pi compatibility

Code comparison

mana:

#!/bin/bash
source config.rc
start_noupstream
start_hostapd
start_dhcp

pi-pwnbox-rogueap:

#!/bin/bash
source config.sh
setup_interface
start_hostapd
start_dnsmasq

airgeddon:

#!/usr/bin/env bash
source libs/lib_general
initialize_script_settings
load_language

The code snippets show initialization processes for each tool. mana and pi-pwnbox-rogueap have similar approaches, while airgeddon uses a more modular structure with separate library files.

mana offers a wider range of attack vectors and better documentation, making it suitable for advanced users. However, it may be more challenging for beginners and requires more resources. pi-pwnbox-rogueap and airgeddon are more focused on specific use cases and may be easier to set up, especially on Raspberry Pi devices.

View More