WiFi Cracking Camp

GUI tool for wireless WEP and WPA/WPA2 pentesting.

Developed by Pablo Sanz Alguacil, Miguel Yanes Fernández and Adam Chalkley, as the Group Project for 3rd year of the Bachelor of Science in Computing in Digital Forensics and Cyber Security at the Technological University Dublin.

Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentication,and data decryption.

New version - WiCC 2

The original WiCC project is no longer mantained, as its new versions are developped and mantained at the repository WiCC2. WiCC 2 is the newest version with added functionalities and fixes, so please refer to that version for further updates.

Project insight

Tool developed in Python 3.7, developed and tested under Kali Linux and Parrot OS distributions. This tool is a GUI toolkit that integrates different open source tools for wireless pentesting. The utilised tools are the following:


You will need to run the application with root privileges, and using some version of Python 3+. Also, you need to have installed aircrack-ng suite and ifconfig, the rest of the tools mentioned in the section Project insight are optional. If any of the mentioned tools is not installed, the application will ask you to automatically install it. Of course, as this is a wireless pentesting tool, you will need some wireless card to perform the scans/attacks. In case you miss some of these requirements, you won't be able to initiate the tool.

Is recommendable to run it on Kali Linux or Parrot OS since both have the required tools preinstalled. Also it is highly recommended to use a wireless card that supports both monitor mode and packet injection. In case your wireless card doesn't support monitor mode, you won't be able to execute the attacks and scans.

What is monitor mode?

Monitor mode, or RFMON (Radio Frequency MONitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic received on a wireless channel. Unlike promiscuous mode, which is also used for packet sniffing, monitor mode allows packets to be captured without having to associate with an access point or ad hoc network first. Monitor mode only applies to wireless networks, while promiscuous mode can be used on both wired and wireless networks. Monitor mode is one of the eight modes that 802.11 wireless cards can operate in: Master (acting as an access point), Managed (client, also known as station), Ad hoc, Repeater, Mesh, Wi-Fi Direct, TDLS and Monitor mode.

Usually the wireless adapter is unable to transmit in monitor mode and is restricted to a single wireless channel, though this is dependent on the wireless adapter's driver, its firmware, and features of its chipset. Also, in monitor mode the adapter does not check to see if the cyclic redundancy check (CRC) values are correct for packets captured, so some captured packets may be corrupted.


The tool is a framework utility, but you need to run it from the command line. To do so, you need to run under root privileges and Python 3+:

$ sudo python3 WiCC.py [options]

There are also some advanced options that you can choose from the command line. These options are originaly meant for debugging purposes, but you may find some of them useful:

You can always view the help with the option --help or -h


Final release

The version 1.0 includes password cracking (WEP and WPA/WPA2 networks), DoS attacks, client de-authentication, and data decryption funtionalities. From now on, the WiCC project is mantained in a different repository. Newer releases can be found there.
If you want to get in contact to notify us about some bugs you encountered, or about some feature you thing could be interesting to add, you can use the contact information showed on our GitHub profiles listed below.


See also the list of contributors who participated in this project.

Source License

This project is under license GNU GPL 3.0