Airgeddon
Airgeddon is a powerful, multi-use bash script designed to audit wireless networks. It’s mainly used for ethical hacking and penetration testing of Wi-Fi networks.

About Airgeddon
Airgeddon is a powerful, open-source bash script designed to simplify wireless network auditing and penetration testing. Built for ethical hackers and cybersecurity professionals, Airgeddon combines multiple trusted tools into one streamlined interface—allowing users to perform complex Wi-Fi attacks with ease.
Integrated Tools
Hashcat
Advanced password recovery
Aircrack-ng
WiFi security auditing tools
Wireshark
Network protocol analyzer
mdk4
WiFi stress testing

Reaver
WPS PIN brute-forcing
Bully
Alternative WPS tool
Tshark
Terminal version of Wireshark
Bettercap
MITM framework
Core Features

Wi-Fi Auditing
Comprehensive wireless network assessment including hidden SSID discovery, channel analysis, and client detection.
Evil Twin Attacks
Create rogue access points and perform credential harvesting attacks with customizable phishing pages.
PMKID Attacks
Capture PMKIDs to crack WPA/WPA2 PSK without requiring clients to be connected.
Handshake Capture
Automated WPA/WPA2 handshake capture with deauthentication techniques.
WPS Attacks
Automated WPS PIN generation and testing against vulnerable routers.
Enterprise Attacks
Advanced capabilities for testing WPA-Enterprise networks including EAP attacks.
Download Of Airgeddon
Getting started with Airgeddon is simple. As an open-source project, Airgeddon is freely available on GitHub and requires no complex setup. Just clone the repository and run the script.
Step 1: Clone the Repository
Open your terminal and run:
git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git
Step 2: Enter the Directory
cd airgeddon
Step 3: Run the Script
sudo bash airgeddon.sh

Frequently Asked Questions (FAQs)
What is Airgeddon used for?
Airgeddon is an open-source bash script designed for auditing wireless networks. It combines several Wi-Fi security tools to perform penetration testing techniques such as handshake capture, PMKID attacks, Evil Twin setups, and deauthentication attacks.
Is Airgeddon legal to use?
Airgeddon is legal when used ethically and with permission. You must only test networks you own or have explicit authorization to audit. Unauthorized use may be illegal and is not supported by the developers.
Which operating systems are compatible with Airgeddon?
Airgeddon is designed to run on Linux-based distributions, including Kali Linux, Ubuntu, Arch, and Parrot OS. It requires root access and a supported wireless adapter.
Does Airgeddon support PMKID attacks?
Yes. Airgeddon features a PMKID capture mode that extracts the PMKID hash directly from the access point without needing client interaction—ideal for fast, offline WPA/WPA2 cracking.
What wireless adapters are required?
You need a wireless adapter that supports monitor mode and packet injection. USB adapters using chipsets like Atheros (AR9271) or Realtek (RTL8812AU) are commonly used with Airgeddon.
How do I install Airgeddon?
Clone the GitHub repository using git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git
and run the script.
Where can I find help or report bugs?
Use the official Airgeddon GitHub repository to open issues or read documentation.
Airgeddon crashes or freezes—how can I debug it?
Run the script in verbose or debug mode and check logs for errors.
Does Airgeddon support automatic handshake verification?
Yes, it includes handshake verification to check for valid handshakes before cracking.
Why does the script exit after selecting a mode?
Check that your adapter is in monitor mode and no conflicting processes (like NetworkManager) are running.
Can I create a fake access point using Airgeddon?
Yes. Airgeddon supports Evil Twin attacks, allowing you to create fake access points with phishing pages to test how users interact with spoofed networks.
Why does Airgeddon show a “missing dependency” error?
Airgeddon checks for required tools on launch. If a dependency is missing, it will prompt you to install it. Run the script with root privileges and ensure your system repositories are up-to-date.
Where can I find documentation or support?
All official documentation is available on GitHub Wiki. For community support, join the discussion on GitHub Issues or in dedicated cybersecurity forums.
What tools are integrated into Airgeddon?
Airgeddon uses popular wireless tools under the hood, including:
- Aircrack-ng
- MDK4
- Hostapd
- Dnsmasq
- Hashcat
How do I update Airgeddon to the latest version?
To update Airgeddon, go to the folder where it is installed and check for updates using Git. This will download the latest version from the official repository. Once updated, simply launch the script again. Make sure to review any new requirements or dependencies mentioned in the updated version.
Does Airgeddon support hash cracking?
Yes, it integrates with Hashcat and Aircrack-ng to crack captured WPA hashes.
Is there support for WEP attacks?
Yes, although WEP is outdated, Airgeddon includes legacy WEP attack modes.
Can Airgeddon clone captive portals?
Yes, it includes phishing techniques by serving custom or cloned login pages.
Can I run Airgeddon on a Raspberry Pi?
Yes, provided you use a compatible Linux OS and wireless adapter.
Is there an installation script?
Airgeddon doesn’t have a traditional installer; simply run the script from its folder.