API Refrence

Command Line Arguments

-h
--help

Show this help message and exit

Hint

[sudo] RoboPhisher -h
[sudo] RoboPhisher --help
-jI
--jamminginterface

Manually choose an interface that supports monitor mode for deauthenticating the victims.

Hint

[sudo] RoboPhisher -jI wlan1
[sudo] RoboPhisher --jamminginterface wlan1

Warning

The same interface can not be used for both jamming interface and ap interface .

-aI
--apinterface

Manually choose an interface that supports AP mode for spawning an AP.

Hint

[sudo] RoboPhisher -aI wlan1
[sudo] RoboPhisher --apinterface wlan1

Warning

The same interface can not be used for both jamming interface and ap interface .

-nJ
--nojamming

Skip the deauthentication phase. When this option is used, only one wireless interface is required.

Hint

[sudo] RoboPhisher -nJ
[sudo] RoboPhisher -nojamming
-e
--essid

Enter the ESSID of the rogue access point you would like to create.

Hint

[sudo] RoboPhisher -e "FREE WIFI"
[sudo] RoboPhisher --essid "FREE WIFI"

Warning

This option will skip access point selection phase.

-p
--phishingscenario

Choose the phishing scenario to run.This option will skip the scenario selection phase.

Hint

[sudo] RoboPhisher -p firmware_upgrade
[sudo] RoboPhisher --phishingscenario firmware_upgrade

Note

The name of the phishing scenario you specify here must match the folder name of the phishing scenario not it’s actual name.

Warning

This option will skip phishing scenario selection phase. This option will also raise an error if the specified phishing scenario is not found.

-pk
--presharedkey

Add WPA/WPA2 protection on the rogue access point.

Hint

[sudo] RoboPhisher -pk s3cr3tp4ssw0rd
[sudo] RoboPhisher --presharedkey s3cr3tp4ssw0rd
--log-file

Enable logging information to a file.

Hint

[sudo] RoboPhisher --log-file

Warning

This argument will only keep the three most recent logs. This means that after the fifth execution with the logging option it will overwrite the oldest log.