Pentest Tools

Published on May 28th, 2016 📆 | 7584 Views ⚑


WarBerryPi – Turn your Raspberry Pi into a War Machine


The WarBerry was built with one goal in mind; to be used in red teaming engagement where we want to obtain as much information as possible in a short period of time with being as stealth as possible. Just find a network port and plug it in. The scripts have been designed in a way that the approach is targeted to avoid noise in the network that could lead to detection and to be as efficient as possible. The WarBerry script is a collection of scanning tools put together to provide that functionality.

To get a list of all options and switches use:

sudo python -h

-h,  --help         [*] Print this help banner
-m,  --man          [*] Prints WarBerry's Man Page
-A,  --attack       [*] Run All Enumeration Scripts
-S,  --sniffer      [*] Run Sniffing Modules Only
-C,  --clear        [*] Clear Output Directories
-F,  --fulltcp      [*] Full TCP Port Scan
-T,  --toptcp       [*] Top Port Scan
-U,  --topudp       [*] Top UDP Port Scan

example usage: sudo python -A
               sudo python --attack
               sudo python -C

Optional: Change the hostname of the RaspberryPi to WarBerry
sudo nano /etc/hosts
sudo nano /etc/hostname
Reboot the WarBerry for the changes to take effect
Create a directory under /home/pi
sudo mkdir WarBerry
Create the Results subdirectory in /WarBerry
sudo mkdir Results
Download WarBerry by cloning the Git repository:
sudo git clone

The tool in case of MAC address filtering enumerates by default the subnets specified under/home/pi/WarBerry/warberry/discover . This is done for the tool to run quicker. If you want to enumerate more subnets either add the subnets in that file or change line 154 in so that it does not read from the file.


  • sudo apt-get install nbtscan
  • sudo apt-get install python-scapy
  • sudo apt-get install tcpdump
  • sudo apt-get install nmap
  • sudo pip install python-nmap
  • sudo pip install ipaddress
  • sudo apt-get install ppp
  • sudo apt-get install sg3-utils
  • sudo apt-get install netdiscover
  • sudo apt-get install macchanger
  • sudo git clone #install in /home/pi/WarBerry/Tools/

Extra Tools for Post Exploitation. Best to install in /home/pi/WarBerry/Tools/ directory

Aircrack Installation


Running the tool with a switch

Connect to GND and port 23 pins on the RPi.

Script for autorunning with a switch
[adsense size='1']

#!/usr/bin/env python2.7
import RPi.GPIO as GPIO
import subprocess

# GPIO 23 set up as input. It is pulled up to stop false signals
GPIO.setup(23, GPIO.IN, pull_up_down=GPIO.PUD_UP)

print "it will connect GPIO port 23 (pin 16) to GND (pin 6)\n"

print "Waiting for falling edge on port 23"

    GPIO.wait_for_edge(23, GPIO.FALLING)["python /home/pi/WarBerry/warberry/ -A"])

except KeyboardInterrupt:
    GPIO.cleanup()       # clean up GPIO on CTRL+C exit
GPIO.cleanup()           # clean up GPIO on normal exit


Download WarBerryPi

Comments are closed.