A Python script for exploiting WPS to retrieve WPA/WPA2 passphrases using the Reaver tool.
For LINUX based OS only
- Interactive interface for wireless exploitation.
- Real-time output display for executed commands.
- Supports error handling and user confirmation.
- Python 3.6+
- Tools:
Reaver
,Colorama
,Pyfiglet
- Clone the repository:
git clone https://github.com/UsamaMatrix/WPS-Exploitation.git cd WPS-Exploitation
- Install dependencies:
pip install -r requirements.txt
- Make it executable:
sudo chmod +x wps_exploitation.py
- Put your wireless interface into monitor mode (e.g.,
airmon-ng start wlan0
). - Run the script:
sudo python3 wps_exploitation.py
If you are planning to use brute force with WPS, you will need a wordlist. You can use the wordlist provided in this repository or download one from SecLists.
For ethical use only. This script is intended for educational purposes and authorized testing on your own networks.
Feel free to fork this repository and submit pull requests. Please ensure your contributions follow ethical guidelines.
Muhammad Usama - Cyber Security Specialist You can connect with me on LinkedIn.