1- [ ![ GitHub version] ( https://img.shields.io/badge/version-2.9.9-informational.svg )] ( # )
1+ [ ![ GitHub version] ( https://img.shields.io/badge/version-2.9.9--beta- informational.svg )] ( # )
22[ ![ GitHub issues] ( https://img.shields.io/github/issues/kimocoder/wifite2.svg )] ( https://github.com/kimocoder/wifite2/issues )
33[ ![ GitHub forks] ( https://img.shields.io/github/forks/kimocoder/wifite2.svg )] ( https://github.com/kimocoder/wifite2/network )
44[ ![ GitHub stars] ( https://img.shields.io/github/stars/kimocoder/wifite2.svg )] ( https://github.com/kimocoder/wifite2/stargazers )
@@ -23,8 +23,6 @@ Wifite is designed to use all known methods for retrieving the password of a wir
23235 . WPA3: Transition mode downgrade attacks (force WPA2 on mixed networks).
24246 . WEP: Various known attacks against WEP, including * fragmentation* , * chop-chop* , * aireplay* , etc.
25257 . ** Evil Twin** : Rogue AP attack with captive portal for credential capture.
26- 8 . WIFI Signal jammer, block specific accesspoints or multiple.
27- signal jamming only works for specific Atheros WiFi chipsets.
2826
2927Run wifite, select your targets, and Wifite will automatically start trying to capture or crack the password.
3028
@@ -58,7 +56,7 @@ Supported Operating Systems
5856
5957### Mobile Support 📱
6058* ** Kali NetHunter (Android)** - Requires custom kernel with monitor mode support
61- * Tested on Android 10 to latest 16
59+ * Tested on Android 10 and newer
6260 * Requires compatible wireless adapter and proper drivers
6361 * See [ NetHunter Documentation] ( https://www.kali.org/docs/nethunter/ ) for setup
6462
@@ -83,8 +81,7 @@ Second, only the latest versions of these programs are supported and must be ins
8381
8482** Required:**
8583
86- * Suggest using ` python3 ` as ` python2 ` was marked deprecated as of january 2020.
87- * As we moved from older python and changed to fully support and run on ` python3.14 `
84+ * ` python3 ` (Python 3.9+, tested up to Python 3.14)
8885* [ ` Iw ` ] ( https://wireless.wiki.kernel.org/en/users/documentation/iw ) : For identifying wireless devices already in Monitor Mode.
8986* [ ` Ip ` ] ( https://packages.debian.org/buster/net-tools ) : For starting/stopping wireless devices.
9087* [ ` Aircrack-ng ` ] ( https://aircrack-ng.org/ ) suite, includes:
@@ -161,8 +158,6 @@ poetry shell
161158sudo wifite
162159```
163160
164- ** See [ POETRY.md] ( POETRY.md ) for detailed Poetry usage and commands.**
165-
166161### Development Install with pip
167162
168163For development or if you want to modify wifite:
@@ -238,7 +233,7 @@ Features
238233 * ** Manual Control** - Specify primary and secondary interfaces manually
239234 * ** Backward Compatible** - Seamlessly falls back to single interface mode
240235 * ** 📖 Complete Guide:** [ Dual Interface Guide] ( docs/DUAL_INTERFACE_GUIDE.md )
241- * ** 🔧 Troubleshooting: ** [ Dual Interface Troubleshooting ] ( docs/DUAL_INTERFACE_TROUBLESHOOTING.md )
236+
242237* ** Wireless Attack Monitoring** - Passive detection and analysis of wireless attacks (use with: ` --monitor-attacks ` )
243238 * ** Real-time Detection** - Identifies deauthentication and disassociation attacks as they occur
244239 * ** Attack Statistics** - Tracks attack counts, targeted networks, and attacker devices
@@ -342,7 +337,7 @@ sudo apt update
342337sudo apt install hcxdumptool hcxtools hashcat
343338```
344339
345- ** 📖 For detailed installation instructions, version requirements, and troubleshooting, see [ WPA3 Tool Requirements Guide ] ( docs/WPA3_TOOL_REQUIREMENTS .md ) **
340+ ** 📖 For WPA3-specific troubleshooting, see [ WPA3 Troubleshooting ] ( docs/WPA3_TROUBLESHOOTING .md ) **
346341
347342#### Understanding WPA3 Network Types
348343
@@ -425,7 +420,7 @@ sudo wifite --monitor-attacks --monitor-hop
425420sudo wifite --monitor-attacks --monitor-log /path/to/attack_log.txt
426421
427422# Use classic text mode instead of TUI
428- sudo wifite --monitor-attacks --classic
423+ sudo wifite --monitor-attacks --no-tui
429424```
430425
431426#### Understanding the TUI Display
@@ -523,7 +518,7 @@ sudo wifite --monitor-attacks --monitor-hop --monitor-log "attacks_$(date +%Y%m%
523518sudo wifite --monitor-attacks --monitor-log /var/log/wifite/attacks_$( date +%Y%m%d) .log
524519
525520# Monitor specific channel in classic mode (no TUI, lower resource usage)
526- sudo wifite --monitor-attacks --monitor-channel 1 --classic --monitor-log attacks.log
521+ sudo wifite --monitor-attacks --monitor-channel 1 --no-tui --monitor-log attacks.log
527522```
528523
529524** Incident Response:**
@@ -576,7 +571,7 @@ sudo wifite -i wlan0mon --monitor-attacks --monitor-channel 6 --monitor-log comp
576571** Optimization Tips:**
577572- Use ` --monitor-channel ` to focus on specific channels for better performance
578573- Avoid channel hopping on busy networks to reduce CPU usage
579- - Use classic mode (` --classic ` ) on resource-constrained systems
574+ - Use classic mode (` --no-tui ` ) on resource-constrained systems
580575- Regularly rotate log files to prevent excessive disk usage
581576
582577** Scalability:**
@@ -866,10 +861,10 @@ Performance Tips
866861* ** Use a dedicated wireless adapter** - USB adapters often perform better than built-in cards
867862* ** Position matters** - Get closer to target networks for better signal strength
868863* ** Choose the right channel** - Use ` -c <channel> ` to focus on specific channels
869- * ** Limit concurrent attacks** - Use ` -- first 5 ` to attack only the strongest targets first
864+ * ** Limit concurrent attacks** - Use ` -first 5 ` to attack only the strongest targets first
870865
871866### Speed Optimization
872- * ** PMKID first** - Try ` --pmkid-only ` for fastest WPA/WPA2 attacks (no clients needed)
867+ * ** PMKID first** - Try ` --pmkid ` for fastest WPA/WPA2 attacks (no clients needed)
873868* ** Skip WPS on modern routers** - Use ` --no-wps ` on newer routers that likely have WPS disabled
874869* ** Use wordlists efficiently** - Start with common passwords, use ` --dict <wordlist> `
875870* ** WPA3 transition mode** - Downgrade attacks are faster than pure SAE capture
@@ -923,7 +918,7 @@ Troubleshooting
923918
924919** Handshake capture issues:**
925920- Ensure clients are connected to the target network
926- - Use ` --deauth-count ` to increase deauth attempts
921+ - Use ` --num-deauths ` to increase deauth attempts
927922- Some networks may require longer capture times
928923
929924** WPA3 attack issues:**
@@ -944,7 +939,7 @@ Troubleshooting
944939- ** No attacks detected:** Ensure your wireless adapter is in monitor mode and positioned to receive signals
945940- ** Permission denied:** Run wifite with ` sudo ` - packet capture requires root privileges
946941- ** High CPU usage:** Use ` --monitor-channel ` instead of ` --monitor-hop ` to reduce processing load
947- - ** TUI not displaying:** Try classic mode with ` --classic ` or check terminal compatibility
942+ - ** TUI not displaying:** Try classic mode with ` --no-tui ` or check terminal compatibility
948943- ** Log file not created:** Verify write permissions for the log file path
949944- ** Interface errors:** Ensure no other tools (airodump-ng, etc.) are using the interface
950945
@@ -973,15 +968,6 @@ Documentation
973968
974969### Comprehensive Guides
975970
976- * ** [ Attack Monitoring Guide] ( docs/ATTACK_MONITORING_GUIDE.md ) ** - Complete guide to wireless attack monitoring
977- * Legal requirements and authorization
978- * Installation and setup
979- * Basic and advanced usage
980- * TUI interface explanation
981- * Log file analysis techniques
982- * Use cases and best practices
983- * Troubleshooting and FAQ
984-
985971* ** [ Evil Twin Attack Guide] ( docs/EVILTWIN_GUIDE.md ) ** - Complete guide to Evil Twin attacks
986972 * Hardware and software requirements
987973 * Usage examples and advanced options
@@ -1000,6 +986,10 @@ Documentation
1000986
1001987* ** [ WPA3 Troubleshooting] ( docs/WPA3_TROUBLESHOOTING.md ) ** - WPA3-specific issues and solutions
1002988
989+ * ** [ WPA3 Detection Optimization] ( docs/WPA3_DETECTION_OPTIMIZATION.md ) ** - WPA3 detection and optimization details
990+
991+ * ** [ Dual Interface Examples] ( docs/DUAL_INTERFACE_EXAMPLES.md ) ** - Dual wireless interface usage examples
992+
1003993### Quick Reference
1004994
1005995For quick help on any feature, use the verbose help flag:
0 commit comments