# fluxion **Repository Path**: mirrors_FluxionNetwork/fluxion ## Basic Information - **Project Name**: fluxion - **Description**: Fluxion is a remake of linset by vk496 with enhanced functionality. - **Primary Language**: Unknown - **License**: GPL-3.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 2 - **Forks**: 0 - **Created**: 2022-01-05 - **Last Updated**: 2026-01-25 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ![Fuxion logo](https://github.com/FluxionNetwork/fluxion/raw/master/logos/logo.jpg) # Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the [FAQ](https://github.com/FluxionNetwork/fluxion/wiki/FAQ) before requesting issues. If you need quick help, you can talk with us on [Discord](https://discord.gg/G43gptk). ## Installation Read [here](https://github.com/FluxionNetwork/fluxion/wiki/Generate-ssh-keys) before you do the following steps.
**Download the latest revision** ``` git clone git@github.com:FluxionNetwork/fluxion.git # Or if you prefer https git clone https://www.github.com/FluxionNetwork/fluxion.git ``` **Switch to tool's directory** ``` cd fluxion ``` **Run fluxion (it will check dependencies and prompt to install any that are missing)** ``` ./fluxion.sh ``` **To install/check dependencies only without running attacks** ``` ./fluxion.sh -i ``` **Fluxion is also available in arch** ``` cd bin/arch makepkg ``` or using the blackarch repo ``` pacman -S fluxion ``` ## :scroll: Changelog Fluxion is actively maintained with new features, improvements, and bugfixes. Be sure to check out the [changelog here](https://github.com/FluxionNetwork/fluxion/commits/master). ## ![Octocat](https://github.githubassets.com/images/icons/emoji/octocat.png "Octocat") How to contribute All contributions are welcome! Code, documentation, graphics, or even design suggestions are welcome; use GitHub to its fullest. Submit pull requests, contribute tutorials or other wiki content -- whatever you have to offer, it'll be appreciated but please follow the [style guide](https://github.com/FluxionNetwork/fluxion/wiki/Code-style-guide). ## :book: How it works * Scan for a target wireless network. * Launch the `Handshake Snooper` attack. * Capture a handshake (necessary for password verification). * Launch `Captive Portal` attack. * Spawns a rogue (fake) AP, imitating the original access point. * Spawns a DNS server, redirecting all requests to the attacker's host running the captive portal. * Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key. * Spawns a jammer, deauthenticating all clients from original AP and luring them to the rogue AP. * All authentication attempts at the captive portal are checked against the handshake file captured earlier. * The attack will automatically terminate once a correct key has been submitted. * The key will be logged and clients will be allowed to reconnect to the target access point. * For a guide to the `Captive Portal` attack, read the [Captive Portal attack guide](https://github.com/FluxionNetwork/fluxion/wiki/Captive-Portal-Attack) ## :heavy_exclamation_mark: Requirements A Linux-based operating system. We recommend Kali Linux 2025.4. An external wifi card is recommended. ## ![Octocat](https://github.githubassets.com/images/icons/emoji/octocat.png "Octocat") Credits 1. l3op - contributor 2. dlinkproto - contributor 3. vk496 - developer of linset 4. Derv82 - @Wifite/2 5. Princeofguilty - @webpages and @buteforce 6. Ons Ali @wallpaper 7. PappleTec @sites 8. MPX4132 - Fluxion V3 9. usama7628674 - contributor 10. cjb900 - moderator ## Disclaimer * Authors do not own the logos under the `/attacks/Captive Portal/sites/` directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. * The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity and is highly discouraged by its authors/developers. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program. ## Note * Beware of sites pretending to be related with the Fluxion Project. These may be delivering malware. * For WN722n V2/V3 VISIT - https://github.com/aircrack-ng/rtl8188eus * Fluxion **DOES NOT WORK** on Windows Subsystem for Linux (WSL/WSL2), because the subsystem doesn't allow access to wireless network interfaces. Any issues regarding WSL will be **Closed Immediately** ## Links **Fluxion website:** https://fluxionnetwork.github.io/fluxion/
**Discord:** https://discord.gg/G43gptk