WiFi Red Team Auditing Suite - Professional penetration testing framework
Project description
๐ป Infiltrator - WiFi Auditing Suite
Developer: LAKSHMIKANTHAN K (letchupkt)
Version: 1.0.0
Platform: Linux Only
License: MIT (Educational/Authorized Testing Only)
โ ๏ธ Disclaimer
THIS TOOL IS FOR EDUCATIONAL AND AUTHORIZED SECURITY TESTING ONLY.
Unauthorized access to computer networks is ILLEGAL. The developers assume NO LIABILITY for misuse of this software. Always obtain proper written authorization before conducting any security assessments.
๐ฏ Overview
Infiltrator is a comprehensive, modular WiFi penetration testing framework built in Python. It follows standard Red Team methodology with three main operational phases:
- Reconnaissance & Intelligence Gathering
- Exploitation & Attack Automation
- Post-Attack Operations & Management
Key Features
โ
Modular Architecture - Easy feature integration and customization
โ
CLI-Based Menu System - Intuitive menu-driven interface
โ
Multi-Adapter Support - Coordinate multiple wireless adapters
โ
Automated Attack Chains - Multi-stage attack automation
โ
Stealth & OPSEC - MAC randomization, panic wipe, operational security
โ
Advanced Attacks - WPA3 downgrade, 802.1X phishing, WPS exploits
๐ Requirements
System Requirements
- OS: Linux Only (Ubuntu 20.04+, Debian 11+, Kali Linux 2023+, Arch Linux, Fedora 35+)
- Python: 3.8+ (3.10+ recommended)
- Privileges: Root/sudo required for wireless operations
- Hardware: USB wireless adapter with monitor mode support
- Architecture: x86_64 (amd64), ARM64, i386
Quick Installation
# From PyPI (Recommended)
pip3 install infiltrator-wifi
sudo apt install -y aircrack-ng reaver hashcat john tshark macchanger hostapd dnsmasq wireless-tools net-tools iw
# From DEB Package (Debian/Ubuntu/Kali)
wget https://github.com/letchupkt/infiltrator/releases/latest/download/infiltrator-wifi_1.0.0-1_all.deb
sudo apt install ./infiltrator-wifi_1.0.0-1_all.deb
# From Source
git clone https://github.com/letchupkt/infiltrator.git
cd infiltrator && sudo ./install.sh
# Run Infiltrator
sudo infiltrator
Recommended Wireless Adapters
- Chipsets: Atheros AR9271, Ralink RT3070, Realtek RTL8812AU
- Models: Alfa AWUS036NHA, TP-Link TL-WN722N v1, Panda PAU09
System Dependencies
# Debian/Ubuntu/Kali
sudo apt update
sudo apt install -y \
aircrack-ng \
reaver \
hashcat \
john \
tshark \
macchanger \
hostapd \
dnsmasq \
wireless-tools \
net-tools \
iw
# Optional (for advanced features)
sudo apt install -y \
hostapd-wpe \
freeradius-wpe \
gpsd \
gpsd-clients
Python Dependencies
pip install -r requirements.txt
๐ Installation
Quick Start
# Install from PyPI
pip3 install infiltrator-wifi
# Install system dependencies (Ubuntu/Debian/Kali)
sudo apt update && sudo apt install -y aircrack-ng reaver hashcat john tshark macchanger hostapd dnsmasq wireless-tools net-tools iw
# Run Infiltrator
sudo infiltrator
Complete Installation Options
| Method | Command | Best For |
|---|---|---|
| PyPI | pip3 install infiltrator-wifi |
Most users |
| DEB Package | sudo apt install ./infiltrator-wifi_1.0.0-1_all.deb |
Debian/Ubuntu/Kali |
| Source | git clone ... && sudo ./install.sh |
Developers |
| Docker | docker-compose run --rm infiltrator |
Isolated testing |
๐ Detailed Instructions: See INSTALL.md for complete installation guide.
๐ฎ Usage
Starting Infiltrator
sudo python3 infiltrator.py
On first run, Infiltrator will:
- Detect wireless adapters
- Offer to enable monitor mode
- Configure initial settings
Main Menu Structure
INFILTRATOR MAIN MENU
โโโ [1] Reconnaissance & Intelligence Gathering
โ โโโ Passive Scanner & Analyzer
โ โโโ Client Probe Monitor
โ โโโ Target Tracker
โ โโโ Geo-Spatial Mapper (War-Driving)
โ โโโ Protocol Fingerprinter
โ
โโโ [2] Exploitation & Attack Automation
โ โโโ Deauth Attack Suite
โ โโโ Handshake/PMKID Capture
โ โโโ Multi-Adapter Evil Twin (MiTM)
โ โโโ WPS Brute-Forcer
โ โโโ WPA3-SAE Downgrade Attack
โ โโโ 802.1X EAP Phishing Suite
โ
โโโ [3] Post-Attack Operations & Management
โ โโโ Offline Cracking Integration
โ โโโ Automated Chain Execution
โ โโโ Stealth & OPSEC Tools
โ โโโ Cloud Cracking API
โ
โโโ [4] Adapter Management
โโโ [5] Settings & Configuration
๐ Feature Documentation
I. Reconnaissance & Intelligence Gathering
Passive Scanner & Analyzer (Basic)
- Monitors 2.4GHz and 5GHz bands
- Collects BSSID, SSID, encryption, signal strength
- Channel hopping for comprehensive coverage
Client Probe Monitor (Basic)
- Captures probe requests from devices
- Builds network history profiles
- Identifies preferred networks
Target Tracker (Advanced)
- Real-time monitoring of specific MAC addresses
- Alerts on target detection
- Tracks connection information
Geo-Spatial Mapper (Advanced)
- GPS-enabled war-driving
- Outputs to KML/GPX formats
- Physical AP location mapping
Protocol Fingerprinter (Legendary)
- Vendor-specific Information Element analysis
- AP make/model/firmware identification
- Zero-day targeting intelligence
II. Exploitation & Attack Automation
Deauth Attack Suite (Basic)
- Disconnect clients from target AP
- Customizable packet count
- Broadcast or targeted attacks
Handshake/PMKID Capture (Basic)
- WPA/WPA2 4-way handshake capture
- PMKID extraction
- Automated deauth integration
Multi-Adapter Evil Twin (MiTM) (Advanced)
- Coordinated multi-adapter attacks
- Rogue AP with DNS/ARP spoofing
- Traffic interception and analysis
WPS Brute-Forcer (Advanced)
- Pixie Dust attacks
- PIN brute-forcing
- Optimized for low-noise operation
WPA3-SAE Downgrade Attack (Legendary)
- Targets WPA3 transition mode
- Forces WPA2 downgrade
- SAE handshake handling
802.1X EAP Phishing Suite (Legendary)
- Rogue RADIUS server simulation
- PEAP/EAP-TTLS credential harvesting
- NTLMv2 hash extraction
III. Post-Attack Operations & Management
Offline Cracking Integration (Basic)
- Hashcat GPU-accelerated cracking
- John the Ripper CPU cracking
- Aircrack-ng WPA/WPA2 cracking
- Wordlist and rule management
Automated Chain Execution (Advanced)
- Full WPA2 Crack: Scan โ Deauth โ Capture โ Crack
- Evil Twin Chain: Scan โ Clone โ Deauth โ Phish
- WPS Chain: Scan WPS โ Pixie โ PIN Brute
- Custom Chains: User-defined sequences
Stealth & OPSEC Tools (Legendary)
- Automatic MAC randomization
- Manual MAC spoofing/restoration
- Panic Wipe: Emergency cleanup
- Kills all attack processes
- Restores adapters to managed mode
- Restores original MACs
- Clears temporary files
- Clears terminal history
Cloud Cracking API (Legendary)
- AWS/GCP GPU cluster integration
- Unlimited computational power
- Secure file upload/download
โ๏ธ Configuration
Configuration is stored in ~/.infiltrator/config.json
Key Settings
{
"adapters": {
"primary_adapter": "wlan0",
"secondary_adapter": "wlan1"
},
"attacks": {
"deauth_count": 0,
"handshake_timeout": 120,
"evil_twin_channel": 6
},
"stealth": {
"mac_randomization": true,
"channel_hopping": true,
"hop_interval": 0.5
},
"cracking": {
"default_wordlist": "/usr/share/wordlists/rockyou.txt",
"hashcat_path": "hashcat"
}
}
๐ Operational Security (OPSEC)
Best Practices
- Always use MAC randomization when conducting assessments
- Enable panic wipe hotkey for emergency situations
- Encrypt captured data at rest
- Use VPN/proxy when uploading to cloud services
- Document authorization before each engagement
- Secure physical access to testing equipment
Panic Wipe Function
In emergency situations, use the Panic Wipe feature:
- Menu:
[3] Post-Attack Operationsโ[3] Stealth & OPSECโ[4] Panic Wipe - Instantly cleans all traces of operation
- Restoration of network adapters to normal state
๐ Example Workflows
Quick WPA2 Handshake Capture
1. Start Infiltrator: sudo python3 infiltrator.py
2. Enable monitor mode (auto-prompted)
3. Navigate: [2] Exploitation โ [2] Handshake Capture
4. Enter target BSSID and channel
5. Confirm deauth attack (y)
6. Wait for handshake
7. Optional: Crack immediately or save for later
Automated WPA2 Crack Chain
1. Navigate: [3] Post-Attack โ [2] Automated Chain
2. Select: [1] Full WPA2 Crack
3. Enter: Target BSSID, channel, wordlist
4. Confirm execution (y)
5. Wait for automated: Scan โ Deauth โ Capture โ Crack
Stealth Reconnaissance
1. Navigate: [3] Post-Attack โ [3] Stealth & OPSEC
2. Select: [2] Randomize All MACs
3. Navigate: [1] Reconnaissance โ [1] Passive Scanner
4. Scan target environment
5. Return: [3] Post-Attack โ [3] Stealth & OPSEC
6. Select: [3] Restore Original MACs
๐ Troubleshooting
Adapter Not Found
- Ensure adapter is connected
- Check driver support:
lsusbandiwconfig - Try manual monitor mode:
sudo airmon-ng start wlan0
Monitor Mode Fails
- Kill interfering processes:
sudo airmon-ng check kill - Update drivers:
sudo apt install linux-headers-$(uname -r) - Check for hard/soft blocks:
rfkill list
Permissions Denied
- Always run with root:
sudo python3 infiltrator.py - Check file permissions:
ls -la ~/.infiltrator/
Capture Files Empty
- Verify monitor mode is active
- Check correct channel is set
- Ensure adapter supports packet injection:
sudo aireplay-ng --test wlan0mon
๐ Learning Resources
- WiFi Security Basics: Understanding WPA/WPA2/WPA3 protocols
- 802.11 Frame Analysis: Wireshark packet captures
- OSCP/OSWP Certifications: Offensive Security training
- Bug Bounty Programs: HackerOne, Bugcrowd (authorized testing)
๐ง Building from Source
Infiltrator includes a comprehensive build system for Linux:
# Automated build (recommended)
chmod +x build.sh
./build.sh
# Using Makefile
make all # Build all packages
make build-python # Python wheel/source
make build-deb # Debian package
make install # Install from source
# Manual build
python3 -m build # Python package
dpkg-buildpackage -b # Debian package
Build Outputs
- Python Package:
dist/infiltrator-wifi-1.0.0.tar.gzand.whl - Debian Package:
../infiltrator-wifi_1.0.0-1_all.deb - Docker Image:
infiltrator-wifi:latest
๐ Build Documentation: See BUILD.md for complete build system guide.
๐ค Contributing
This is a modular framework designed for easy extension:
Development Setup
git clone https://github.com/letchupkt/infiltrator.git
cd infiltrator
make setup-dev # Set up development environment
source venv/bin/activate
Adding Features
- Create module in
modules/directory - Follow existing module structure
- Add menu entry in
core/cli.py - Update documentation and tests
- Test on multiple Linux distributions
Code Quality
make format # Format with black
make lint # Lint with flake8
make test # Run tests
๐ License
Educational/Authorized Testing Only
This software is provided "AS IS" without warranty. Users are solely responsible for ensuring legal compliance. Unauthorized network access is a criminal offense in most jurisdictions.
๐ Credits
Developer: LAKSHMIKANTHAN K (letchupkt)
Tools Integrated:
- Aircrack-ng suite
- Reaver/Pixie-WPS
- Hashcat
- John the Ripper
- Scapy
Inspired by: WiFi Pineapple, Wifite2, Fluxion
๐ง Contact
For authorized security testing inquiries only.
Developer: letchupkt
Purpose: Educational security research
Remember: With great power comes great responsibility. Always hack ethically. ๐ก๏ธ
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file infiltrator_wifi-1.1.5.tar.gz.
File metadata
- Download URL: infiltrator_wifi-1.1.5.tar.gz
- Upload date:
- Size: 37.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
dc405fb2565404fa0e68778b49b7996feac59aa150741192f0ac6ee85e1a5b0f
|
|
| MD5 |
e0d879c9253f2e91279e1edcbd53f645
|
|
| BLAKE2b-256 |
22aa0b7862e55ca13f87dde74647389c9f7126380bf0816593b23d0613443566
|
File details
Details for the file infiltrator_wifi-1.1.5-py3-none-any.whl.
File metadata
- Download URL: infiltrator_wifi-1.1.5-py3-none-any.whl
- Upload date:
- Size: 37.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
124f862bd462791566ca3f19ae2b23742c61ba0cbca5b65f3cf89302ac7c0072
|
|
| MD5 |
3886a65df535794c8193d951bdaac5fd
|
|
| BLAKE2b-256 |
7fac6e593dea04329806809a22c7a34d17f84d5c5922f5ad737c999ee0f1adbe
|