A cross-platform, high-performance WiFi analyzer and auditing tool built with Tauri v2, React, and Rust.
Bringing the fluid UX of modern Android WiFi analyzers to the desktop, combined with the offensive capabilities of tools like ESP32 Marauder.
Real-time WiFi spectrum analysis and network auditing in action
Aether is organized into a modular 10-page interface using the sleek shadcn/ui dark theme.
- π Dashboard: Real-time network table showing BSSID, SSID, Channel, and RSSI with color-coded signal strength bars and sortable columns.
- π‘ Spectrum Analyzer: Overlapping parabolic curves across 2.4 GHz, 5 GHz, and 6 GHz bands β visualizes channel congestion.
- π― Hunt Mode: Lock onto a target MAC address and track its RSSI over a rolling 60-second timeline. Walk around to triangulate signal origin.
- π Audit Suite (Planned Consolidation): Dedicated tab for 1-Click Handshake Capture (Deauth β EAPOL listener β save
.pcap). - β‘ Attack Suite (Planned Consolidation): Advanced 802.11 injections inspired by ESP32 Marauder (Beacon spam, deauths, karma attacks).
- π΅οΈ Recon: Host discovery, port scanning, and service enumeration.
- ποΈ Sniffer: Low-level packet monitoring for probe requests, deauths, PMKID collection, and more.
- π οΈ Tools: Utility suite for MAC spoofing, SSID management, AP management, and wardriving capabilities.
- π©Ί Environment Doctor: Auto-detects missing USB adapters, monitor mode status, and driver compatibility. Provides copy-paste remediation commands.
- βοΈ Settings: List all network interfaces, toggle monitor/managed mode, view driver and PHY info.
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β βοΈ React Frontend (Aether-UI / shadcn/ui) β
β ββ π Dashboard (network table, stats) β
β ββ π‘ Spectrum (2.4/5/6 GHz channel viz) β
β ββ π― Hunt Mode (targeted RSSI tracker) β
β ββ π Audit (WPA handshake capture) β
β ββ β‘ Attack (injection & flooding) β
β ββ π΅οΈ Recon (network discovery) β
β ββ ποΈ Sniffer (raw packet monitor) β
β ββ π οΈ Tools (MAC spoofing, utilities) β
β ββ π©Ί Env Doctor (diagnostics) β
β ββ βοΈ Settings (interface mode control) β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β π Tauri v2 IPC Bridge β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β π¦ Rust Backend (Aether-Core) β
β ββ InterfaceScanner (iw dev / ip link) β
β ββ ModeController (managed β monitor) β
β ββ PacketSniffer (pcap + 802.11 parse) β
β ββ AttackEngine (frame injection) β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β π§ Linux Kernel (nl80211 / wireless stack) β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
| Requirement | Installation |
|---|---|
| Node.js 18+ | nodejs.org |
| Rust (stable) | rustup.rs |
| Tauri v2 CLI | cargo install tauri-cli |
| Dependencies | sudo apt install libpcap-dev libwebkit2gtk-4.1-dev build-essential curl wget |
| Platform | Native Kali Linux VM (VMware/VirtualBox) or Bare Metal. |
| USB WiFi Adapter | Must support Monitor mode and packet injection (e.g., Alfa AWUS036ACH, TP-Link Archer T4U). |
Note: Windows/WSL2 support has been entirely scrapped in favor of native Kali Linux VM setups due to persistent USB passthrough limitations and DKMS driver instability. Aether requires a native Linux environment.
# π¦ Clone and install frontend dependencies
git clone https://github.com/Wontfallo/Aether_wifi.git
cd Aether_wifi
npm install
# π₯οΈ Launch Aether
# The launcher automatically handles monitor mode setup and privilege elevation
npm run tauri devLinux WiFi capture requires CAP_NET_RAW and CAP_NET_ADMIN to bind to interfaces in monitor mode. Aether uses a specialized launcher (aether.sh) to automatically:
- Stop interfering services (
NetworkManager,wpa_supplicant). - Put your selected interface into monitor mode using proper driver support.
- Launch the Tauri application with
sudowhile preserving necessary environment variables for Rust ($PATH,CARGO_HOME,RUSTUP_HOME). - Restore services when closed.
- Driver Compatibility: Ensure you are using the correct DKMS drivers for your specific chipset (e.g.,
realtek-rtl88xxau-dkmsfor RTL8812AU/RTL8814AU). Standard kernel drivers likertw88_8814aucan be temperamental with monitor mode packet injection. - Validation: If monitor mode works but no packets are captured, verify hardware viability with
tcpdump -i wlan0or by testing with standalone tools like Wifite. - Missing Interface: If the launcher fails to find an interface, ensure your USB adapter is physically connected and passed through to your Kali VM.
This project serves as a living diary of our development journey.
We initially attempted to run Aether entirely within Windows Subsystem for Linux (WSL2) to provide a seamless Windows-native experience. We built a PowerShell script (scripts/attach_wsl_wifi.ps1) to leverage usbipd-win.
However, deep dive diagnostics revealed that DKMS (Dynamic Kernel Module Support) failed to compile realtek-rtl8814au-dkms against the active WSL kernel (6.6.87.2-microsoft-standard-WSL2) due to missing build trees and undefined kernel symbols. Recompiling custom WSL2 kernels specifically for out-of-tree Wi-Fi injection drivers proved too fragile.
The Solution: We scrapped the entire "WSL nonsense" and migrated the project to a Native Kali Linux VM via VMware Workstation. By letting the hypervisor handle the USB pass-through, the native Kali DKMS packages now compile perfectly against a standard kernel, giving us a fully functioning, monitor-mode capable wlan0 interface.
Even after moving to the VM, we hit immediate blockers with wlan0 packet captures. Specifically, Tauri threw CAPTURE_ERROR: Failed to activate capture on 'wlan0': libpcap error: Attempt to create packet socket failed - CAP_NET_RAW may be required.
- The Culprit: Rust applications launched via Tauri need elevated privileges to bind raw packet sockets (
libpcap). We updated theaether.shlauncher to wrapcargo tauri devwithsudo -Eto ensure the Rust backend inherits the necessary capabilities while maintaining the user's$PATHfor Node and Cargo. - RF Weirdness & Driver Quirks: Even in monitor mode,
airmon-ngand initial scans yielded nothing, despite seeing APs perfectly fine in managed mode. This led to us utilizing tools like Wifite standalone to validate that the hardware actually worked, while dealing with extreme 2.4GHz RF interference in the environment (a bizarre 55dBm hump on channel 11 blowing out adjacent channels).
The user rightly pointed out: "please dont build your own ui components when you could just use know great lookkng libraries right?"
We entirely scrapped our custom CSS and Aether-specific utility classes, transitioning to a pure shadcn/ui dark theme.
- Components Installed: Over 14 core components (Button, Card, Badge, Table, Tabs, Dialog, Input, Select, Switch, etc.) were deeply integrated.
- Page Expansion: We scaffolded 4 entirely new pages (
/recon,/attack,/sniffer,/tools) to expand our offensive posture, building out the sidebar to 10 distinct navigation items. - The Result: The app immediately felt more robust, responsive, and maintainable. We flirted with migrating to Material-UI (
MUI) momentarily but committed to the sleek, modern aestheticshadcn/uiprovided.
During debugging, we used tools like Wifite and Bettercap to manually test our hardware. While Aether does not run these tools under the hood, we recognized their power and elegance.
- The Goal: We are modeling Aether's native offensive capabilities after the excellent ESP32 Marauder (Beacon spam, deauths, karma attacks) and Bettercap workflows.
- Rather than reinventing the wheel blindly, we aim to build our own high-speed Rust orchestrator that matches the capabilities of these proven tools.
Our immediate next objective is merging the scattered offensive tabs (Audit.tsx, Attack.tsx) into a single, cohesive Offensive Suite. This unified interface will house 1-click captures, targeted deauths, and advanced injections in one intuitive dashboard.
Aether_wifi/
βββ π src/ # βοΈ React Frontend
β βββ π components/
β β βββ π layout/ # AppShell, Sidebar
β β βββ π ui/ # shadcn/ui components (Radix primitives + Tailwind)
β βββ π hooks/
β β βββ π useBeaconCapture.tsx # Shared state for captured data
β βββ π pages/
β β βββ π Dashboard.tsx # Network scan table
β β βββ π Spectrum.tsx # Channel spectrum analyzer
β β βββ π Hunt.tsx # RSSI target tracker
β β βββ π Audit.tsx # [PLANNED MERGE] WPA Handshake capture
β β βββ π Attack.tsx # [PLANNED MERGE] Beacon spam, injection attacks
β β βββ π Recon.tsx # Network discovery & port scanning
β β βββ π Sniffer.tsx # Low-level packet monitor
β β βββ π Tools.tsx # Utility suite
β β βββ π EnvironmentDoctor.tsx # System diagnostics
β β βββ π Settings.tsx # Interface management
β βββ π App.tsx # React Router
β βββ π index.css # Global styles (shadcn/ui dark theme)
βββ π src-tauri/ # π¦ Rust Backend
β βββ π src/
β β βββ π commands/ # Tauri IPC endpoints
β β βββ π network/ # Core Logic (Sniffing, Attacks, Scans)
β β βββ π error.rs # Custom error handling
β β βββ π main.rs # Entry point
β βββ π Cargo.toml
β βββ π tauri.conf.json
βββ π aether.sh # Linux Privileged Launcher (sudo wrapper)
βββ π package.json # Entry scripts
Warning
This tool contains offensive security capabilities (deauthentication attacks, packet injection, evil portals).
Use only on networks you own or have explicit written authorization to test.
Unauthorized use may violate federal and local laws. The authors assume no liability for misuse of this software.
This project is licensed under the MIT License - see the LICENSE file for details.