Aircrack-UI is a web-based graphical interface for aircrack-ng, designed to simplify Wi-Fi security testing by providing an intuitive and efficient user interface. It removes the need to manually run complex terminal commands without needing to write them yourselves.
Aircrack-ng is powerful but heavily command-line driven, which can be error-prone and inconvenient during testing.
Aircrack-UI provides a user-friendly web interface that makes wireless security testing faster, clearer, and more accessible.
- Web-based UI for aircrack-ng
- Two attack modes:
- Handshake Capture
- Deauthentication (Deauth) Attack
- Select multiple Wi-Fi networks for deauth attacks
- Select multiple wireless adapters to distribute attack load
- Real-time interaction through the web interface
- Download captured
.capfiles directly from the UI - Built using Flask, Socket.IO, and Scapy
⚠️ Legal & Ethical DisclaimerThis project is intended strictly for educational purposes and authorized security testing only.
You must own the network you are testing or have explicit permission from the network owner.Unauthorized wireless attacks, deauthentication, packet capture, or monitoring of networks you do not control may be illegal and punishable under local, national, or international law.
The author of this project assume no liability for misuse, damage, or legal consequences resulting from the use of this software.
Install all required dependencies with a single command:
sudo apt install python3-flask python3-socketio python3-scapy aircrack-ngAircrack-UI can be run on a Raspberry Pi to create a fully portable wireless testing device.
- Run Aircrack-UI on a Raspberry Pi
- Use the internal Wi-Fi adapter to host a hotspot
- Connect to the hotspot using a phone or laptop
- Open the web UI in a browser and perform attacks remotely
This effectively turns the Raspberry Pi into a portable Wi-Fi auditing machine.
It is strongly recommended to use a lightweight Linux distribution such as DietPi.
- Aircrack-ng uses
airmon-ng check kill, which stops network services - Heavier OSes may drop the hotspot when the script starts
- DietPi keeps networking stable while attacks are running
- Minimal background services reduce conflicts
To prevent accidentally attacking the Raspberry Pi’s own hotspot:
- Open
main.py - Locate line 17
- Add the BSSID of the Raspberry Pi hotspot to the exclusion list
This ensures:
- The hotspot does not appear in the UI
- You cannot accidentally deauth or attack your own access point
This step is highly recommended when using the Raspberry Pi setup.
You can configure Aircrack-UI to start automatically when the Raspberry Pi boots.
Create a service file:
sudo nano /etc/systemd/system/aircrack-ui.servicePaste the following (Adjust Paths)
[Unit]
Description=Aircrack-UI Web Interface
After=network.target
[Service]
ExecStart=/usr/bin/python3 /path/to/app.py
WorkingDirectory=/path/to/
User=root
Restart=always
[Install]
WantedBy=multi-user.targetEnable and start the service
sudo systemctl daemon-reload
sudo systemctl enable aircrack-ui
sudo systemctl start aircrack-uiAfter this, Aircrack-UI will:
- Start automatically on boot
- Be accessible as soon as the hotspot is active
