Tip
This project is part of the FadSec Lab suite.
Discover our focus on ad-free, privacy-first applications and stay updated on future releases
Wifade is a modern, terminal-based WiFi manager with an integrated brute-forcer for Windows (Linux/macOS support coming soon). It offers:
- π¨βπ» Interactive TUI (Text-based UI): A polished, menu-driven interface for easy navigation and operation.
- πΆ Wi-Fi Management:
- Scan: Discover and list all available Wi-Fi networks with details like signal strength, encryption type, and status.
- Connect: Connect to any Wi-Fi network, including open and password-protected ones.
- Status: Get a detailed report of your current connection, including private/public IP, gateway, DNS, MAC address, and link speed.
- Control: Disconnect from networks or restart your Wi-Fi adapter with simple commands.
- π Integrated Brute-Forcer:
- Dictionary Attack: Test network password strength using a built-in wordlist of over 4,700 common passwords.
- Custom Wordlists: Select and use your own custom password files for targeted testing.
- β‘οΈ Quick CLI Actions: Bypass the interactive UI for instant results. Use flags to get your IP, scan networks, check status, and more.
Linux and macOS support is planned and in development. Stay tuned for cross-platform releases!
- Go to the GitHub Releases page.
- Download the latest
WifadeSetup-X.X.exe
installer. - Run the installer. It requires administrator privileges to add
wifade
to your system's PATH. - Once installed, you can open any terminal and run the
wifade
command, or launch Wifade via the Start Menu or desktop shortcut.
Linux and macOS installation instructions will be provided when those versions are released.
Wifade can be launched in two modes: Interactive Mode for a full user interface, or CLI Mode for quick, direct commands.
Simply run the command without any parameters to launch the full interactive interface.
wifade
Use flags to perform actions instantly without entering the interactive menu. This is perfect for scripting or quick checks.
# Display comprehensive Wi-Fi status
wifade -status
# Sample output:
ββ πΆ Wi-Fi Connection Status
β SSID : HomeWifi
β Signal : ββββ 96%
β Encryption : WPA2
β Private IP : 192.168.1.8
β Public IP : xx.xx.xx.1
β Gateway : 192.168.1.1
β°ββββββββββββββββββββββββββββββββββββ
# Scan for and list available networks
wifade -scan
# Sample output:
ββ πΆ Available Networks
β
β # SSID Signal Encryption Status
β ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β 1 Home ββββ 98% WPA2 Available
β 2 Wifi_asdwead ββββ 100% Open Available
β 3 HomeFloor2 ββββ 90% WPA2 Available
# Get your private IP address
wifade -ip
# Sample output:
192.168.1.42
# Get your public IP address
wifade -publicip
# Sample output:
2xx.0.113.7
# Connect to a network directly
wifade "MyNetwork" mypassword123
# Sample output:
Connecting to 'MyNetwork'...
Connection successful!
# See a quick reference of all commands
wifade -list
# Sample output:
ββ π Wifade - Quick Parameter Reference
β
β β‘ QUICK ACTIONS:
β -IP Show current private IP address
β -Status Show Wi-Fi connection status
β -Scan List available Wi-Fi networks
β -PublicIP Show current public IP address
# Show detailed help documentation
wifade -help
# Sample output:
ββ π Wifade Help Documentation
β
β π USAGE:
β wifade [OPTIONS]
β
β βοΈ OPTIONS:
β -Help, -h Display this help information
β -Version Display application version and exit
β -List List all available command-line parameters
Wifade's password security testing features are accessible from the interactive menu.
- Dictionary Attack: Uses the built-in
probable-v2-wpa-top4800.txt
wordlist. This file contains over 4,700 of the most common WPA passwords. - Custom Password File: Allows you to use your own wordlist. You can select a
.txt
file using the file picker dialog.
Upon entering Attack Mode for the first time, you will be required to accept an ethical usage disclaimer.
π οΈ Building from Source (Windows)
If you want to build the project yourself, follow these steps:
-
Ensure you have PowerShell 7+ installed.
-
Install the required
ps2exe
module:Install-Module -Name ps2exe -Force
-
Run the build script from a PowerShell 7 terminal with Administrator privileges:
./Build-Wifade.ps1
-
The compiled executables (
wifade.exe
,WifadeCore.exe
) and other assets will be placed in thebuild/
directory.
This tool is intended for educational purposes and ethical security testing only.
- Do not test networks you do not own or have explicit, written permission to test.
- Unauthorized access to computer networks is illegal. You are solely responsible for your actions.
- The developer of Wifade is not responsible for any misuse of this tool.
- The password list
probable-v2-wpa-top4800.txt
is taken from: danielmiessler/SecLists - Public IP address detection uses the free service: api.ipify.org
Contributions are welcome! If you'd like to help improve Wifade or test upcoming Linux/macOS support, fork the repository, make your changes, and submit a pull request. Please open an issue for bugs or feature requests.