Skip to content

Add AutoWIFI - Wireless Penetration Testing Framework#222

Open
momenbasel wants to merge 1 commit intocarpedm20:masterfrom
momenbasel:add-autowifi
Open

Add AutoWIFI - Wireless Penetration Testing Framework#222
momenbasel wants to merge 1 commit intocarpedm20:masterfrom
momenbasel:add-autowifi

Conversation

@momenbasel
Copy link
Copy Markdown

Summary

  • Adds AutoWIFI to the Network > Tools section
  • AutoWIFI is a Python wireless penetration testing framework (GPL-3.0) that automates the full wireless attack chain from reconnaissance through exploitation
  • Supports multi-vector attacks (WEP, WPA/WPA2, WPS), multiple cracking backends (aircrack-ng, hashcat, John the Ripper), session management, report generation, automatic monitor mode, and MAC randomization
  • Installable via pip install autowifi

Placed next to Aircrack-ng in the Network Tools section since they are closely related in purpose.

AutoWIFI is a wireless penetration testing framework (Python, GPL-3.0)
that automates the full wireless attack chain from reconnaissance
through exploitation, with support for WEP, WPA/WPA2, and WPS attacks.
Copilot AI review requested due to automatic review settings April 8, 2026 21:52
Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Adds AutoWIFI to the repository’s README under Network > Tools, expanding the curated list of network/wireless security tooling alongside Aircrack-ng.

Changes:

  • Added a new README entry linking to the AutoWIFI project
  • Described AutoWIFI’s purpose and supported wireless attack vectors/backends in a single bullet

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Copy link
Copy Markdown

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request adds the AutoWIFI wireless penetration testing framework to the README. A review comment suggests refining the tool's description to be more concise and consistent with the existing list's punctuation and style.

Comment thread README.md
* [ssh-mitm](https://github.com/jtesta/ssh-mitm) - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
* [nmap](https://nmap.org/) - Nmap (Network Mapper) is a security scanner
* [Aircrack-ng](http://www.aircrack-ng.org/) - An 802.11 WEP and WPA-PSK keys cracking program
* [AutoWIFI](https://github.com/momenbasel/AutoWIFI) - A wireless penetration testing framework that automates the full attack chain from recon to exploitation, supporting WEP, WPA/WPA2, and WPS with multiple cracking backends.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The description for AutoWIFI is significantly longer than the surrounding entries and uses inconsistent punctuation (trailing period). To improve readability and maintain the style of the list, consider a more concise description that highlights its Python-based nature and aligns with the punctuation of adjacent entries like Aircrack-ng.

Suggested change
* [AutoWIFI](https://github.com/momenbasel/AutoWIFI) - A wireless penetration testing framework that automates the full attack chain from recon to exploitation, supporting WEP, WPA/WPA2, and WPS with multiple cracking backends.
* [AutoWIFI](https://github.com/momenbasel/AutoWIFI) - Python framework for automated wireless penetration testing (WEP/WPA/WPS) using multiple cracking backends

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants