PiSavar - Detects PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection)
About Project
The goal of this project is to find out the fake access points opened by the WiFi pineapple device using the PineAP module and to prevent clients from being affected by initiating a deauthentication attack to the attacking device.
How PineAP Module Works
- Collects SSID information
- Creates SSID pool with collected SSID information
- Creates fake access points using information in the SSID pool
Where is the problem?
Features of PiSavar
- Detects PineAP activities.
- Detects networks opened by PineAP.
- Starts deauthentication attack for PineAP.
Features to add
- List of clients connected to fake access points
- Record activities - Logging
Diagram
--------------------------------------------------------------------------------
Usage
Requirements
- Hardware: TP LINK TL-WN722N
- Modules: scapy, time, termcolor, argparse, commands, netifaces, logging
Kali Linux:
Download pisavar:
git clone https://github.com/WiPi-Hunter/PiSavar.git
Install Python librarie(s):
pip install termcolor
It's done!
Run the program with following command:
Monitor mode:
airmon-ng start interface(wlan0,wlan1) (Monitor mode)
or
ifconfig wlan0 down
iwconfig wlan0 mode Monitor
ifconfig wlan0 upRun:
cd PiSavar
python pisavar.py -hScreenshots
Demo Video
Authors
This project is coded by Besim ALTINOK

Formed in 2009, the Archive Team (not to be confused with the archive.org Archive-It Team) is a rogue archivist collective dedicated to saving copies of rapidly dying or deleted websites for the sake of history and digital heritage. The group is 100% composed of volunteers and interested parties, and has expanded into a large amount of related projects for saving online and digital history.







