-
-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Open
Description
Bugs
- SSH and Telnet Crash.
- Path: WiFi > SSH/TelNET
- After entering the target host IP, port (including port 22), and password, the device crashes.
- This happens consistently with different servers.
- Expected behavior: The client should attempt to establish a connection or return an error message if the connection fails.
- Actual behavior: Device crashes immediately after submitting connection details.
- Targeted Deauth Stops Immediately
- Path: WiFi > Scan Hosts > Select IP > Station Deauth
- The deauthentication attack starts but stops immediately.
- Expected behavior: The deauth attack should continue running until manually stopped.
- Actual behavior: The attack terminates automatically within seconds.
- ARP Spoofing / ARP Poisoning Not Working
- Path: WiFi > Scan Hosts > Select IP > ARP Spoofing/Poisoning
- After selecting the option, the screen returns to the host list.
- No visible indication that the attack starts.
- Expected behavior: ARP spoofing/poisoning should initiate and remain active until stopped.
- Actual behavior: The interface exits back to the host list immediately.
Great project. Thanks a lot!
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels