airgeddon
by v1s1t0r1sh3r3
airgeddon is a versatile bash script for Linux that audits wireless networks by integrating monitoring, vulnerability scanning, and exploitation capabilities.
This is a multi-use bash script for Linux systems to audit wireless networks.
Primary Use Case
This tool is primarily used by security professionals and penetration testers to assess the security posture of wireless networks. It facilitates the identification of vulnerabilities and supports exploitation techniques to test network defenses in controlled environments.
- Multi-use bash script tailored for Linux wireless network auditing
- Network monitoring and scanning for wireless vulnerabilities
- Integration with external tools like Hashcat, Bettercap, and BeEF
- Support for various wireless cards and chipsets
- Docker support for cross-platform usage (Linux, Mac OSX, Windows)
- Plugin system for extensibility and custom feature development
- Comprehensive compatibility and requirements documentation
- Includes options for WPA/WPA2 handshake capture and cracking
Installation
- Clone the repository from GitHub: git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git
- Navigate to the cloned directory: cd airgeddon
- Ensure bash version 4.2 or higher is installed
- Install essential dependencies and tools as listed in the Requirements wiki
- Run the script with appropriate permissions: sudo ./airgeddon.sh
- Optionally, use Docker images for easier setup on Linux, Mac OSX, or Windows
- Refer to the Wiki for detailed installation and usage instructions
Usage
>_ ./airgeddon.shLaunches the airgeddon interactive bash script for wireless auditing
>_ sudo ./airgeddon.shRuns airgeddon with root privileges required for network interface manipulation
>_ docker run -it v1s1t0r1sh3r3/airgeddonRuns airgeddon inside a Docker container for isolated environment usage
- Leverage airgeddon's plugin system to integrate custom wireless attack vectors for red team exercises.
- Combine captured WPA/WPA2 handshakes with Hashcat integration for efficient credential cracking during penetration tests.
- Use Docker support to enable cross-platform deployment and facilitate purple team collaboration between red and blue teams.
- Incorporate airgeddon scans into continuous wireless security assessments to proactively identify vulnerabilities.
- Pair airgeddon with network monitoring tools to enhance detection of rogue access points and wireless attacks.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about airgeddon. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
3 free chats per tool • Instant responses • No credit card
Related Tools

v2ray-core
v2fly/v2ray-core
A platform for building proxies to bypass network restrictions.

sniffnet
GyulyVGC/sniffnet
Comfortably monitor your Internet traffic 🕵️♂️
algo
trailofbits/algo
Set up a personal VPN in the cloud
setup-ipsec-vpn
hwdsl2/setup-ipsec-vpn
Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
cilium
cilium/cilium
eBPF-based Networking, Security, and Observability
netbird
netbirdio/netbird
Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.
