Pentesting Tools Wireless Attacks Wireless Network

PiKarma – Detects Wireless Network Attacks

PiKarma – Detects wireless network attacks performed by KARMA module (fake AP) and starts de-authentication attack for fake access points

Working Principle:

  • Collects all the packets from Wireless Network. (Probe Response)
  • Analyses all the packets in real time.
  • If PiKarma finds more than one SSID info from unique mac address in Probe Response.
  • Logs the activity with some extra information within defined template and sends de-authentication packets

How works KARMA Attack?

  • Sends Probe Response for all Probe Requests



Softwares and hardwares that uses KARMA module

  • FruityWifi
  • WiFi Pineapple
  • Mana (improvements to KARMA attacks)

Demo Video:


Hardware: TP LINK TL-WN722N or D RangeMax wifi card
Modules: scapy, time, termcolor, argparse, netifaces, logging
Kali Linux:
Download PiKarma:

git clone

Install Python librarie(s):
pip install termcolor

It’s done!

Run the program with following command:

Monitor mode:

airmon-ng start interface(wlan0,wlan1) (Monitor mode)


ifconfig wlan0 down
iwconfig wlan0 mode Monitor
ifconfig wlan0 up


cd PiKarma
python -h

Post Comment