Automatic Wi-Fi ‪Hacking‬ Tool: Evil Twin Attack

Post Reply
User avatar
Site Admin
Posts: 708
Joined: Sun Feb 16, 2014 3:30 pm

Automatic Wi-Fi ‪Hacking‬ Tool: Evil Twin Attack

Post by hackinformer » Tue Oct 27, 2015 7:27 pm

This tool is created to aid the penetration testers in assessing wireless security. The author is not responsible for misuse.


Usage: python (from the same folder where you codes exist)

NOTE: Please make sure to run the 'configure under File menu to install required software'

FAQ: 1) I have a problem with connecting to Database


There seem to be few issues with Database connectivity. The solution is to create a new user on the database and use that user for launching the tool. Follow the following steps.

Delete dbconnect.conf file from the Infernalwireless folder the following command from your mysql console.

mysql>use mysql;

mysql> CREATE USER 'root2'@'localhost' IDENTIFIED BY 'enter the new password here';

mysql> GRANT ALL PRIVILEGES ON *.* TO 'root2'@'localhost' WITH GRANT OPTION;

Try to run the tool again.

GUI Wireless security assessment SUIT


-- WPA2 hacking

-- WEP Hacking

-- WPA2 Enterprise hacking

-- Wireless Social Engineering

-- SSL Strip

-- Report generation

--- PDF Report

--- HTML Report

-- Note-taking function

-- Data is saved into Database

-- Network mapping

-- MiTM

-- Probe Request


Improved compatibility

Report improvement

Better NAT Rules


Wireless Evil Access Point traffic redirect
Fixed WPA2 Cracking
Fixed Infernal Wireless
Fixed Free AP
Check for requirements
DB implementation via config file
Improved Catch and error
Check for requirements
Works with Kali 2
Coming Soon:

Parsing t-shark log files for gathering creds and more

More attacks.

BUGS expected:

the wireless card might not be supported

windows might crash


a lot of work to be done, but this tool is still being developed.

Download: Automatic Wi-Fi ‪Hacking

For any comments and suggestions please email
Last edited by hackinformer on Tue Oct 27, 2015 7:34 pm, edited 1 time in total.
Post Reply