Skip to main content
A module provides a features that not is necessary to use with access point, the must modules are projected for add a new functionality into attack, like devices discovery, services enumeration, perform deauthentication attacks and etc. Modules are introduced to add more functionalities to complement the attack.
The syntax of modules basically follows the structure of the metasploit modules.
The basic core command guidelines:
commandsdescriptions
setset options for module
backgo back one level
helpshow avaliable commands
optionsshow options of current module
runexecute module
Modules developers and users are welcome to include your module into this project, take a look the guidelines how to create a module.