M00N is a Swiss Army knife for WiFi penetration testing specifically designed for Raspberry Pi with compatible network interfaces. It provides an intuitive user interface for various WiFi security techniques.
WARNING: This tool is developed exclusively for:
- Authorized security testing on owned networks
- Educational and research purposes
- Ethical penetration testing with explicit permission
USING THIS SOFTWARE ON NETWORKS WITHOUT AUTHORIZATION IS ILLEGAL AND PUNISHABLE BY LAW. The developers assume no responsibility for misuse of this tool.
- 4-Way Handshake Capture - Capture WPA/WPA2 handshake with automatic deauth
- AP Scan - WiFi network scanning with connected station detection
- Raw Sniff - Raw packet sniffing on specific networks
- Deauth Attack - Targeted deauthentication attacks:
- Single Target (specific device)
- Entire Network (entire network)
- Both 5GHz-2.4GHz (multi-band attacks)
- Beacon Flood - Beacon flooding with different modes:
- Common-networks (common SSIDs)
- Personal-networks (customized SSIDs)
- Random (random SSIDs)
- Aircrack-ng Suite (airodump-ng, aireplay-ng, airmon-ng)
- MDK4 for advanced attacks
- Graphical interface optimized for 128x128 LCD display
- Network interface management with multi-country support
- Raspberry Pi (Tested on Pi Zero WH, compatible with all models)
- Operating System: DietPi (recommended)
- Display: 1.44" LCD 128x128 pixels (integrated)
- Compatible WiFi adapter with Monitor Mode and Packet Injection support
- Tested with: Alfa AWUS036AC (rtl8812au chipset)
- Requirements: Interface supporting monitor mode and packet injection
Download DietPi Download balenaEtcher Flash Dietpi on your SD card Start your Raspberrypi and configure the OS connecting the raspberry pi to your wifi and enabling ssh for convenience --> https://dietpi.com/docs/install/
sudo apt update && sudo apt upgrade -y
sudo apt install python3 python3-pip git build-essential linux-headers-$(uname -r) -y
- Open dietpi-config tool:
dietpi-config - Navigate to:
Advanced Optionsthen press Enter - Select SPI:
SPI state - Enable SPI:
Select Enablethen Press Enter (dietpi might enable it automaticaly) - Exit and reboot: Exit dietpi-config, the system will automatically reboot.
git clone https://github.com/aircrack-ng/rtl8812au.git
cd rtl8812au
sudo make
sudo make install
sudo modprobe 88XXau
sudo dkms status
sudo apt install aircrack-ng -y
sudo apt install mdk4 -y
sudo apt install nmap wireless-tools net-tools -y
sudo apt install python3-RPi.GPIO python3-pillow python3-psutil python3-spidev python3-numpy
git clone https://github.com/Lif28/M00N.git
cd M00N
sudo mkdir -p /root/M00N/Logs /root/M00N/WpaHandshakes /root/M00N/AP_Scan /root/M00N/RawSniff
Edit Settings/settings.json:
{
"interface": "wlan1",
"country": "EU"
}
Supported interfaces:
- EU: Europe (channels 1-13 + 5GHz)
- US: United States (channels 1-11 + 5GHz)
- JP: Japan (channels 1-14 + 5GHz)
- CN: China (channels 1-13 + 5GHz)
sudo nano /etc/systemd/system/moon.service
[Unit]
Description=M00N Boot Executer
After=network.target
[Service]
ExecStart=/usr/bin/python /root/M00N/main.py
WorkingDirectory=/root/M00N/
StandardOutput=inherit
StandardError=inherit
Restart=always
User=root
[Install]
WantedBy=multi-user.target
sudo systemctl enable moon.service
sudo systemctl start moon.service
sudo systemctl status moon.service
- KEY_UP: Navigate up in menu
- KEY_DOWN: Navigate down in menu
- KEY_PRESS: Select option/Confirm
- KEY2: Secondary actions (details, stop scanning)
- KEY3: Back/Exit
- Main menu → Wifi → Sniffers → 4-way handshake
- Select target network from list
- Press KEY2 to see network details
- Press KEY_PRESS to start capture
- Choose deauth method:
- aireplay-ng - Traditional deauthentication
- mdk4 - Advanced deauthentication
- Wait for handshake capture (timeout: 10 minutes)
- Wifi → Sniffers → AP scan → Default
- Automatic scanning of available networks
- Select network
- Press KEY2 to see station list
- Press KEY_PRESS on "Save" to export results
- Wifi → Sniffers → Raw Sniff
- Select target network
- Raw packet sniffing on specified network
- Files saved in /root/M00N/RawSniff/
- Wifi → Attacks → Deauth
- Select target network
- Choose attack mode:
- Single Target: Deauth specific device
- Scan connected stations
- Select MAC target
- Entire Network: Deauth entire network
- Both 5ghz-4ghz: Multi-band attack
- Single Target: Deauth specific device
- Use KEY3 to stop attack
- Wifi → Attacks → Beacon Flood
- Select beacon type:
- Common-networks: Common SSIDs (Facebook, Starbucks, etc.)
- Personal-networks: Customized SSIDs
- Random: Randomly generated SSIDs
- Attack started automatically
- KEY3 to stop
- Main menu → Settings → Interface
- List of available interfaces:
- Select: Change primary interface
- Restart: Restart interface
- Interface: WiFi interface selection
- SSH: Enable/Disable SSH access
- System: System options
sudo iwconfig
sudo systemctl restart networking
sudo modprobe -r 88XXau && sudo modprobe 88XXau
sudo airmon-ng check kill
sudo airmon-ng start wlan1
sudo iwconfig
sudo i2cdetect -y 1
sudo systemctl restart display-manager
M00N/ ├── main.py # Main application ├── Libs/ │ ├── mojstd.py # UI system, display, input │ ├── netstd.py # Networking functions and attacks │ └── APScanner.py # Advanced WiFi network scanner ├── Settings/ │ └── settings.json # Global configuration ├── Images/ # Graphic resources (logo, icons) ├── Logs/ # Operation log files │ ├── airodump.txt # Airodump-ng logs │ ├── aireplay.txt # Aireplay-ng logs │ └── mdk4.txt # MDK4 logs ├── WpaHandshakes/ # Captured WPA handshakes ├── AP_Scan/ # AP scan results ├── Beacons/ # Beacon flood configuration files ├── pcap/ # Packet capture (evil twin) └── RawSniff/ # Raw packet sniffing
- Verify problem reproducibility
- Provide detailed logs from /root/M00N/Logs/
- Include configuration from Settings/settings.json
- Additional interface support
- Performance optimizations
- New attack techniques
- Expanded documentation
- Official documentation
- GitHub repository issues
- Dedicated community
Version: M00N v1.0 Platform: Raspberry Pi + DietPi Status: Stable Last Update: 2025
M00N - Illuminating WiFi network security
