Airgeddon

Airgeddon is a powerful, multi-use bash script designed to audit wireless networks. It’s mainly used for ethical hacking and penetration testing of Wi-Fi networks.

Downloads
120 k+
GitHub Stars
7.2 k
Tools Integrated
15 +
Community Members
10 k+

About Airgeddon

Airgeddon is a powerful, open-source bash script designed to simplify wireless network auditing and penetration testing. Built for ethical hackers and cybersecurity professionals, Airgeddon combines multiple trusted tools into one streamlined interface—allowing users to perform complex Wi-Fi attacks with ease.

Integrated Tools

Hashcat

Advanced password recovery

Aircrack-ng

WiFi security auditing tools

Wireshark

Network protocol analyzer

mdk4

WiFi stress testing

Reaver

WPS PIN brute-forcing

Bully

Alternative WPS tool

Tshark

Terminal version of Wireshark

Bettercap

MITM framework

Core Features

Wi-Fi Auditing

Comprehensive wireless network assessment including hidden SSID discovery, channel analysis, and client detection.

Evil Twin Attacks

Create rogue access points and perform credential harvesting attacks with customizable phishing pages.

PMKID Attacks

Capture PMKIDs to crack WPA/WPA2 PSK without requiring clients to be connected.

Handshake Capture

Automated WPA/WPA2 handshake capture with deauthentication techniques.

WPS Attacks

Automated WPS PIN generation and testing against vulnerable routers.

Enterprise Attacks

Advanced capabilities for testing WPA-Enterprise networks including EAP attacks.

Download Of Airgeddon

Getting started with Airgeddon is simple. As an open-source project, Airgeddon is freely available on GitHub and requires no complex setup. Just clone the repository and run the script.

Step 1: Clone the Repository
Open your terminal and run:
 git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git
Step 2: Enter the Directory
 cd airgeddon
Step 3: Run the Script
 sudo bash airgeddon.sh

Frequently Asked Questions (FAQs)

Airgeddon is an open-source bash script designed for auditing wireless networks. It combines several Wi-Fi security tools to perform penetration testing techniques such as handshake capture, PMKID attacks, Evil Twin setups, and deauthentication attacks.

Airgeddon is legal when used ethically and with permission. You must only test networks you own or have explicit authorization to audit. Unauthorized use may be illegal and is not supported by the developers.

Airgeddon is designed to run on Linux-based distributions, including Kali Linux, Ubuntu, Arch, and Parrot OS. It requires root access and a supported wireless adapter.

Yes. Airgeddon features a PMKID capture mode that extracts the PMKID hash directly from the access point without needing client interaction—ideal for fast, offline WPA/WPA2 cracking.

You need a wireless adapter that supports monitor mode and packet injection. USB adapters using chipsets like Atheros (AR9271) or Realtek (RTL8812AU) are commonly used with Airgeddon.

Clone the GitHub repository using git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git and run the script.

Use the official Airgeddon GitHub repository to open issues or read documentation.

Run the script in verbose or debug mode and check logs for errors.

Yes, it includes handshake verification to check for valid handshakes before cracking.

Check that your adapter is in monitor mode and no conflicting processes (like NetworkManager) are running.

Yes. Airgeddon supports Evil Twin attacks, allowing you to create fake access points with phishing pages to test how users interact with spoofed networks.

Airgeddon checks for required tools on launch. If a dependency is missing, it will prompt you to install it. Run the script with root privileges and ensure your system repositories are up-to-date.

All official documentation is available on GitHub Wiki. For community support, join the discussion on GitHub Issues or in dedicated cybersecurity forums.

Airgeddon uses popular wireless tools under the hood, including:

  • Aircrack-ng
  • MDK4
  • Hostapd
  • Dnsmasq
  • Hashcat


To update Airgeddon, go to the folder where it is installed and check for updates using Git. This will download the latest version from the official repository. Once updated, simply launch the script again. Make sure to review any new requirements or dependencies mentioned in the updated version.

Yes, it integrates with Hashcat and Aircrack-ng to crack captured WPA hashes.

Yes, although WEP is outdated, Airgeddon includes legacy WEP attack modes.

Yes, it includes phishing techniques by serving custom or cloned login pages.

Yes, provided you use a compatible Linux OS and wireless adapter.

Airgeddon doesn’t have a traditional installer; simply run the script from its folder.