๐Ÿ NullSec Pineapple Ops Center

March 3, 2026 ยท View on GitHub

Command & Control Dashboard for WiFi Pineapple Pager and Mark VII

A web-based operations center for managing WiFi Pineapple devices during authorized security assessments. Deploy payloads, run recon scans, collect loot, and generate professional audit reports โ€” all from a single dashboard.

Python Flask License

โšก Features

๐Ÿ–ฅ๏ธ Web Dashboard

  • Real-time operations overview with animated radar, activity feed, and device status
  • 4 color themes โ€” NullSec (blue), Crimson (red), Matrix (green), Phantom (purple)
  • Boot sequence with matrix rain animation and system checks
  • Background effects โ€” floating particles, grid overlay, CRT scanlines

๐Ÿ“ก Device Management

  • Connect to multiple Pineapple Pager and Mark VII devices via SSH
  • Real-time device status, version, uptime, and storage monitoring
  • One-click connect/disconnect with auto-discovery

โš”๏ธ Payload Arsenal

  • Browse all payloads by platform (Pager / Mark VII) and category
  • Syntax-highlighted payload viewer with metadata display
  • One-click deploy via SCP to connected devices
  • Deploy & Run for Mark VII bash payloads

๐Ÿ” WiFi Reconnaissance

  • Live recon scanning via airodump-ng with real-time WebSocket updates
  • Signal strength chart โ€” color-coded by security protocol
  • Security breakdown โ€” visual WPA3/WPA2/WEP/Open distribution bars
  • AP table โ€” sortable network inventory with signal bars
  • Demo mode โ€” generates realistic scan data for testing without hardware

๐Ÿ’ฐ Loot Vault

  • Pull captured data from devices (handshakes, credentials, logs)
  • Built-in file browser and content viewer
  • Automatic collection from standard loot directories

๐Ÿ“„ Report Generator

  • Generate professional HTML security audit reports
  • Includes risk scoring, findings, recommendations, and full network inventory
  • NullSec branded with dark theme styling

๐Ÿ’ป Remote Terminal

  • SSH command execution directly from the dashboard
  • Command history with arrow key navigation
  • Color-coded output (commands, results, errors)

๐Ÿ“ฆ Included Payloads

Pager (DuckyScript)

PayloadCategoryDescription
WiFi GuardBlue TeamContinuous monitoring for rogue APs, evil twins, deauth attacks
Compliance AuditorBlue TeamChecks all APs against security policy (WPA3, WPS, etc.)
Rogue AP DetectorBlue TeamHunts for evil twins and unauthorized access points
Signal MapperReconMulti-point signal strength mapping for coverage analysis
Audit ReporterReportingGenerates comprehensive WiFi security assessment reports

Mark VII (Bash)

PayloadCategoryDescription
wifi-guard.shBlue TeamContinuous security monitor with alert logging
compliance-auditor.shBlue TeamWiFi compliance audit with pass/fail scoring
rogue-detector.shBlue TeamEvil twin detection with AP whitelist support
signal-mapper.shReconMulti-location signal mapping with CSV export
audit-reporter.shReportingProfessional audit report with risk scoring

๐Ÿš€ Quick Start

# Clone the repo
git clone https://github.com/bad-antics/nullsec-pineapple-ops.git
cd nullsec-pineapple-ops

# Install dependencies
chmod +x install.sh
./install.sh

# Start the Ops Center
python3 server.py

Open http://localhost:1337 in your browser.

๐Ÿ”ง Configuration

Edit config.json to set defaults:

{
  "devices": [],
  "settings": {
    "theme": "nullsec",
    "default_ssh_port": 22,
    "default_user": "root",
    "default_pager_ip": "172.16.52.1",
    "scan_duration": 30,
    "scan_interface": "wlan1mon"
  }
}

Environment Variables

  • OPS_PORT โ€” Server port (default: 1337)

Custom Port

OPS_PORT=8080 python3 server.py

๐Ÿ—๏ธ Project Structure

nullsec-pineapple-ops/
โ”œโ”€โ”€ server.py              # Flask + SocketIO backend
โ”œโ”€โ”€ config.json            # Device & settings config
โ”œโ”€โ”€ requirements.txt       # Python dependencies
โ”œโ”€โ”€ install.sh             # Setup script
โ”œโ”€โ”€ templates/
โ”‚   โ””โ”€โ”€ dashboard.html     # Main dashboard UI
โ”œโ”€โ”€ static/
โ”‚   โ”œโ”€โ”€ css/style.css      # NullSec dark theme
โ”‚   โ””โ”€โ”€ js/app.js          # Frontend logic
โ”œโ”€โ”€ payloads/
โ”‚   โ”œโ”€โ”€ pager/             # DuckyScript payloads
โ”‚   โ”‚   โ”œโ”€โ”€ wifi-guard/
โ”‚   โ”‚   โ”œโ”€โ”€ compliance-auditor/
โ”‚   โ”‚   โ”œโ”€โ”€ rogue-detector/
โ”‚   โ”‚   โ”œโ”€โ”€ signal-mapper/
โ”‚   โ”‚   โ””โ”€โ”€ audit-reporter/
โ”‚   โ””โ”€โ”€ mark7/             # Bash scripts
โ”‚       โ”œโ”€โ”€ wifi-guard.sh
โ”‚       โ”œโ”€โ”€ compliance-auditor.sh
โ”‚       โ”œโ”€โ”€ rogue-detector.sh
โ”‚       โ”œโ”€โ”€ signal-mapper.sh
โ”‚       โ””โ”€โ”€ audit-reporter.sh
โ”œโ”€โ”€ loot/                  # Collected loot (auto-created)
โ””โ”€โ”€ reports/               # Generated reports (auto-created)

๐ŸŽจ Themes

Switch themes in Settings or via localStorage:

ThemeAccent ColorStyle
NullSec#58a6ff BlueDefault hacker aesthetic
Crimson#f85149 RedAggressive red ops
Matrix#3fb950 GreenClassic green terminal
Phantom#a371f7 PurpleStealth purple

๐Ÿค Companion Suite

This ops center is designed to work alongside the NullSec Pineapple Suite โ€” 96+ payloads for the WiFi Pineapple Pager.

This tool is designed for authorized security testing and educational purposes only. Unauthorized access to computer networks is illegal. Always obtain proper written authorization before conducting any security assessment. The authors assume no liability for misuse.

๐Ÿ“ License

MIT License โ€” ยฉ 2024-2026 bad-antics โ€ข NullSec Security


GitHub โ€ข Website โ€ข Ko-fi โ˜•