▓█████▄ ▓█████ ▄▄▄ █ ██ ▄▄▄█████▓ ██░ ██
▒██▀ ██▌▓█ ▀▒████▄ ██ ▓██▒▓ ██▒ ▓▒▓██░ ██▒
░██ █▌▒███ ▒██ ▀█▄ ▓██ ▒██░▒ ▓██░ ▒░▒██▀▀██░
░▓█▄ ▌▒▓█ ▄░██▄▄▄▄██ ▓▓█ ░██░░ ▓██▓ ░ ░▓█ ░██
░▒████▓ ░▒████▒▓█ ▓██▒▒▒█████▓ ▒██▒ ░ ░▓█▒░██▓
▒▒▓ ▒ ░░ ▒░ ░▒▒ ▓▒█░░▒▓▒ ▒ ▒ ▒ ░░ ▒ ░░▒░▒
░ ▒ ▒ ░ ░ ░ ▒ ▒▒ ░░░▒░ ░ ░ ░ ▒ ░▒░ ░
░ ░ ░ ░ ░ ▒ ░░░ ░ ░ ░ ░ ░░ ░
░ ░ ░ ░ ░ ░ ░ ░ ░
░
▄▄▄ ▄▄▄█████▓▄▄▄█████▓ ▄▄▄ ▄████▄ ██ ▄█▀
▒████▄ ▓ ██▒ ▓▒▓ ██▒ ▓▒▒████▄ ▒██▀ ▀█ ██▄█▒
▒██ ▀█▄ ▒ ▓██░ ▒░▒ ▓██░ ▒░▒██ ▀█▄ ▒▓█ ▄ ▓███▄░
░██▄▄▄▄██░ ▓██▓ ░ ░ ▓██▓ ░ ░██▄▄▄▄██ ▒▓▓▄ ▄██▒▓██ █▄
▓█ ▓██▒ ▒██▒ ░ ▒██▒ ░ ▓█ ▓██▒▒ ▓███▀ ░▒██▒ █▄
▒▒ ▓▒█░ ▒ ░░ ▒ ░░ ▒▒ ▓▒█░░ ░▒ ▒ ░▒ ▒▒ ▓▒
▒ ▒▒ ░ ░ ░ ▒ ▒▒ ░ ░ ▒ ░ ░▒ ▒░
░ ▒ ░ ░ ░ ▒ ░ ░ ░░ ░
░ ░ ░ ░░ ░ ░ ░
░
A simple and automatized tool for deauthication attacks