LinuxCommandLibrary

angryoxide

802.11 WiFi attack and penetration testing tool

TLDR

Start scanning on a wireless interface
$ sudo angryoxide -i [wlan0]
copy
Scan specific channels
$ sudo angryoxide -i [wlan0] -c [1,6,11]
copy
Target a specific network
$ sudo angryoxide -i [wlan0] -t [AA:BB:CC:DD:EE:FF]
copy
Run in passive mode without transmitting attack frames
$ sudo angryoxide -i [wlan0] --notransmit
copy
Scan an entire band with auto-hunt
$ sudo angryoxide -i [wlan0] -b [5] --autohunt
copy
Run headless with custom output
$ sudo angryoxide -i [wlan0] --headless -o [output_prefix]
copy

SYNOPSIS

sudo angryoxide -i interface [options]

DESCRIPTION

angryoxide is an 802.11 WiFi attack tool written in Rust that autonomously collects WPA/WPA2/WPA3 hash material (EAPOL handshakes and PMKIDs) for offline cracking with Hashcat. It features a real-time TUI built with Ratatui showing discovered networks, captured handshakes, and attack status.
The attack engine performs PMKID collection, hidden SSID retrieval, anonymous reassociation (MFP bypass), Channel Switch Announcement attacks, RSN downgrade, and WiFi 6e disassociation. Output files include Hashcat-compatible .hc22000 hashlines, .pcapng packet captures, and Kismet-compatible .kismetdb databases.

PARAMETERS

-i, --interface interface

Wireless interface to use (required)
-c, --channel channels
Specific channel(s) to scan (default: 1,6,11)
-b, --band band
Scan an entire band (2, 5, 6, or 60)
-t target
Target specific MAC or SSID (repeatable)
-w target
Whitelist a MAC or SSID from attacks (repeatable)
--targetlist file
Load targets from a file
--whitelist file
Load whitelist from a file
-o, --output prefix
Custom output filename prefix
-r, --rate level
Attack aggressiveness: 1 (low), 2 (default), 3 (high)
--notransmit
Passive collection only, no attack frames sent
--autohunt
Auto-discover target channels, then focus on them
--headless
Run without the terminal UI
--autoexit
Exit when all targets have valid hashlines
--combine
Merge all .hc22000 files into a single output
--gpsd ip:port
Connect to GPS daemon for wardriving
-h, --help
Display help

CAVEATS

Requires root/sudo privileges and a wireless adapter supporting monitor mode and packet injection. Intended strictly for authorized security testing and research. Rate-controlled transmission reduces but does not eliminate detection by wireless IDS.

HISTORY

angryoxide was created by Ragnt (rage), inspired by hcxdumptool. Written in Rust and licensed under GPL-3.0, it is under heavy active development.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard