RaspyJack is for authorized security testing, research, and education only.
- Do not use it on networks/systems you do not own or have explicit permission to test.
- You are solely responsible for how you use this project.
- The authors/contributors are not responsible for misuse.
- LCD-driven handheld-style interface (Waveshare 1.44" HAT)
- Payload categories (reconnaissance, interception, exfiltration, etc.)
- Loot collection + browsing
- WebUI remote control dashboard
- Payload IDE (browser editor + run flow)
- Responder / DNS spoof tooling integration
- WiFi utilities + optional attack flows (with compatible USB dongle)
Check the WIKI for more ! https://github.com/7h30th3r0n3/Raspyjack/wiki
| Item | Description | Buy |
|---|---|---|
| Waveshare 1.44" LCD HAT | SPI TFT + joystick + 3 buttons |
Buy Buy |
| Raspberry Pi Zero 2 WH | Quad-core 1 GHz, 512 MB RAM – super compact | Buy |
| RPI 0W + Waveshare Ethernet/USB HUB HAT | 3 USB + 1 Ethernet | Buy |
| Alternative: Dual Ethernet/USB HUB HAT | 2 USB + 2 Ethernet | Buy |
Note: Raspyjack on RPI 0w1/2 can run headless trough WebUi, but need an ethernet module at least.
| Item | Description | Buy |
|---|---|---|
| Raspberry Pi 3 Model B | Almost same specs as RPI 0w2 | Buy |
| Raspberry Pi 4 Model B (4 GB) | Quad-core 1.5 GHz, full-size HDMI, GigE LAN | Buy |
| Raspberry Pi 5 (8 GB) | Quad-core Cortex-A76 2.4 GHz, PCIe 2.0 x1 | Buy |
Note: Raspberry Pi 4/5 is not fully tested yet. It should work trough Webui but screen probably need some ajustement. Feedback is welcome.
Important: The onboard Raspberry Pi WiFi (Broadcom 43430) cannot be used for WiFi attacks.
| Dongle | Chipset | Monitor Mode |
|---|---|---|
| Alfa AWUS036ACH | Realtek RTL8812AU | ✅ Full support |
| TP-Link TL-WN722N v1 | Atheros AR9271 | ✅ Full support |
| Panda PAU09 | Realtek RTL8812AU | ✅ Full support |
- Deauth attacks on 2.4 GHz and 5 GHz networks
- Multi-target attacks with interface switching
- Automatic USB dongle detection and setup
The onboard Pi WiFi chipset is limited for monitor/injection workflows. For WiFi attack payloads, use a compatible external USB WiFi adapter.
Examples commonly used:
- Alfa AWUS036ACH (RTL8812AU)
- TP-Link TL-WN722N v1 (AR9271)
- Panda PAU09 (RTL8812AU)
From a fresh Raspberry Pi OS Lite install:
sudo apt update
sudo apt install -y git
sudo -i
cd /root
git clone https://github.com/7h30th3r0n3/raspyjack.git Raspyjack
cd Raspyjack
chmod +x install_raspyjack.sh
./install_raspyjack.sh
rebootAfter reboot, RaspyJack should be available on-device.
sudo -i
cd /root
rm -rf Raspyjack
git clone https://github.com/7h30th3r0n3/raspyjack.git Raspyjack
chmod +x install_raspyjack.sh
./install_raspyjack.sh
rebootBefore major updates, back up loot/config you care about.
RaspyJack includes a browser UI and IDE in web/.
- WebUI docs:
web/README.md - Main WebUI:
https://<device-ip>/(or fallbackhttp://<device-ip>:8080) - Payload IDE:
https://<device-ip>/ide(orhttp://<device-ip>:8080/ide)
./scripts/check_webui_js.shThis validates syntax for:
web/shared.jsweb/app.jsweb/ide.js
| Control | Action |
|---|---|
| UP / DOWN | Navigate |
| LEFT | Back |
| RIGHT / OK | Enter / Select |
| KEY1 | Context/extra action (varies) |
| KEY2 | Secondary action (varies) |
| KEY3 | Exit / Cancel |
Raspyjack/
├── raspyjack.py
├── web_server.py
├── device_server.py
├── rj_input.py
├── web/
│ ├── index.html
│ ├── app.js
│ ├── ide.html
│ ├── ide.js
│ ├── shared.js
│ ├── ui.css
│ ├── device-shell.css
│ └── README.md
├── payloads/
│ ├── reconnaissance/
│ ├── interception/
│ ├── exfiltration/
│ ├── remote_access/
│ ├── general/
│ ├── games/
│ └── examples/
├── loot/
├── DNSSpoof/
├── Responder/
└── wifi/
PRs are welcome.
If you submit UI changes, please include:
- short description + screenshots/gifs,
- any changed routes/workflows,
- output of
./scripts/check_webui_js.sh.
