Pentest Tools

Published on May 12th, 2016 📆 | 4823 Views ⚑


WiFi-Pumpkin — Rogue WiFi Access Point Attack

Powered by iSpeech

Framework for Rogue WiFi Access Point Attack

WiFi-Pumpkin is security tool that provide the Rogue access point to Man-In-The-Middle and network attacks. purporting to provide wireless Internet services, but snooping on the traffic. can be used to capture of credentials of unsuspecting users by either snooping the communication by phishing.



  • Rouge WiFi Access Point
  • Deauth Clients AP
  • Probe Request Monitor
  • DHCP Starvation Attack
  • Crendentials Monitor
  • Windows Update Attack
  • Templates phishing
  • Partial bypass HSTS
  • Dump credentials phishing
  • Support airodump scan
  • Support mkd3 deauth
  • beef hook support
  • Report Logs html
  • Mac Changer
  • ARP Posion
  • DNS Spoof


WiFi-Pumpkin v0.7.5 Released !

[adsense size='1']

WiFi-Pumpkin installation

  • hostapd
  • isc-dhcp-server
  • php5-cli
  • Linux require soft:
    • rfkill , iptables , nmcli

To Install Pyqt4

Install the dependencies:

pip install -r requirements.txt
 git clone
 cd WiFi-Pumpkin
 chmod +x
 ./ --install



Transparent Proxy

You can use transparent proxies to intercept and manipulate HTTP/HTTPS traffic by modifying requests and responses and inject javascripts into pages that targets visit. You can easily implement a module to inject data into pages by creating a python file in “Proxy”directory  which will automatically be listed on PumpProxy tab.

Rogue WiFi Access Point Attack: WiFi-Pumpkin Wiki

Rogue WiFi Access Point Attack: WiFi-Pumpkin


Source && Download

Comments are closed.