README.md

April 23, 2026 ยท View on GitHub

NullSec Pineapple Suite

๐Ÿ NullSec Pineapple Suite

The Largest WiFi Pineapple Pager Payload Collection
125 payloads across 14 categories โ€” more than any other third-party suite

Stars Forks License

Quick Start โ€ข Payload Catalog โ€ข Categories โ€ข Installation โ€ข Contributing


๐ŸŽฏ Overview

NullSec Pineapple Suite is the most comprehensive third-party payload collection for the Hak5 WiFi Pineapple Pager. With 125 professional payloads spanning 14 categories, it covers every aspect of WiFi security testing โ€” from reconnaissance and interception to exfiltration and stealth operations.

Why NullSec Suite?

FeatureNullSec SuiteHak5 OfficialOthers
Total Payloads1251555-20
Categories14~102-4
Attack Payloads19~81-3
Recon Payloads23~91-5
Stealth Suite1100
Blue Team800
Games480
NullSec Themeโœ… (112 components)โŒโŒ
FastBoot Optimizerโœ…โŒโŒ
One-Click Installโœ…โœ…โŒ
Factory Restore Scriptโœ…โŒโŒ
Active Developmentโœ…โœ…โŒ

โšก Quick Start

# Clone & install (one command)
git clone https://github.com/bad-antics/nullsec-pineapple-suite && cd nullsec-pineapple-suite && ./install.sh

# Or via SSH directly to Pineapple
ssh root@172.16.52.1 "cd /tmp && git clone https://github.com/bad-antics/nullsec-pineapple-suite && cd nullsec-pineapple-suite && ./install.sh"

After install: Dashboard โ†’ Payloads โ†’ User โ†’ nullsec โ†’ Pick any payload and run!

โš ๏ธ External adapter required. The Pineapple Pager has no internal recon radio โ€” its built-in wifi is management-only. All recon / attack / audit payloads need a USB adapter (the Hak5 MK7AC is the supported one). Plug it in before running any payload; it will usually enumerate as wlan1. Payloads autodetect the right interface via lib/nullsec-iface.sh and you can override with export IFACE=wlanX or by writing /root/.nullsec_env. If scans come back with zero results, run ip link show; iw dev; lsusb on the pager to confirm the adapter is present.


๐Ÿ“ฆ Categories

๐Ÿšจ Alerts (7 payloads)

Real-time monitoring and alerting for security events.

PayloadDescription
DeauthAlertMonitors for deauthentication frames and alerts on attacks
HandshakeAlertWatches for WPA handshake captures in real-time
ClientAlertAlerts when new clients connect to your AP
RogueAPAlertDetects evil twin and rogue access points
IntrusionAlertLightweight IDS โ€” port scans, ARP spoofing, SYN floods
BandwidthAlertMonitors bandwidth usage with configurable thresholds
GeoFenceAlertGPS-based geofence monitoring for device tracking

โš”๏ธ Attack (19 payloads)

Offensive WiFi security testing tools.

PayloadDescription
AuthFloodAuthentication flood using aireplay-ng
BansheeMulti-vector WiFi disruption
CaptivePortalCustom captive portal for credential harvesting
ChannelJammerTargeted channel jamming
DeauthStormMass deauthentication with targeting
DNSHijackDNS hijacking for traffic redirection
EvilTwinEvil twin AP with automatic client migration
FloodGateCombined deauth + beacon + auth flood assault
HotspotHijackHijack existing hotspot connections
KarmaAttackRespond to all probe requests
MassDeauthMass deauthentication of all nearby clients
PixieDustWPS Pixie Dust offline attack
PMKIDGrabberGrab PMKID hashes without client interaction
ProbeAttackExploit probe requests to lure clients
SirenAudio-visual attack alerts
TargetedDeauthPrecision deauth of specific clients
WPSBruteforceWPS PIN brute force with Pixie Dust
WifiJammerBroad-spectrum WiFi jamming

๐Ÿค– Automation (5 payloads)

Set-and-forget automated attack chains.

PayloadDescription
AutoPwnFully automated: scan โ†’ identify โ†’ exploit chain
ReaperAutomated client harvesting and processing
ScheduledScanSchedule recurring network scans
TimeBombSchedule attacks for delayed execution
ZeroClickZero-interaction automated exploitation

๐Ÿ” Capture (8 payloads)

Credential and handshake capture tools.

PayloadDescription
CredSnifferReal-time credential sniffing from traffic
EAPHarvesterHarvest EAP/enterprise credentials
HandshakeHunterAutomated WPA/WPA2 handshake capture
PMKIDCapturePMKID-based WPA capture (clientless)
PacketReplayCapture and replay network packets
USBCredStealerUSB-based credential extraction
WPACrackerOn-device WPA handshake cracking

๐Ÿ“ค Exfiltration (5 payloads)

Data extraction and loot management.

PayloadDescription
DataVacuumExtract URLs, cookies, credentials from traffic
CloudExfilUpload loot to cloud storage (Dropbox, webhooks)
DNSExfilCovert data exfiltration via DNS tunneling
ICMPTunnelCovert data exfiltration via ICMP tunneling
LootSyncSync all captured loot to USB storage

๐ŸŽฎ Games (4 payloads)

Entertainment for downtime during engagements.

PayloadDescription
NumberCrackerNumber guessing game with hacking theme
PagerPongText-based Pong game on Pager display
SignalHuntWiFi signal strength treasure hunt
WarGamesWOPR-style hacking simulation (4 game modes)

๐Ÿ•ต๏ธ Interception (5 payloads)

Man-in-the-middle and traffic interception.

PayloadDescription
MITMProxyTransparent HTTP/HTTPS proxy with logging
ARPSpoofARP cache poisoning for MITM attacks
SSLStripHTTPS downgrade attacks
DNSSiphonDNS query interception and browsing pattern analysis
PacketSnifferProtocol-aware packet capture (HTTP/FTP/SMTP/DNS)

๐ŸŽช Pranks (5 payloads)

Fun and harmless WiFi pranks.

PayloadDescription
BeaconSpamFlood area with fake SSIDs
NetParasiteInject content into HTTP traffic
RickRollRedirect all HTTP to Rick Astley
SSIDPranksCreative SSID message broadcasting
WiFiConfuserGenerate confusing network environments

๐Ÿ” Recon (23 payloads)

The largest recon suite available for Pineapple Pager.

PayloadDescription
5GHzHunterDiscover and enumerate 5 GHz networks
BluetoothScannerClassic BT + BLE device discovery
ClientTrackerTrack client devices across networks
DeviceFingerprintOS and device fingerprinting via WiFi
DroneHunterDetect and track nearby drones
HiddenNetFinderDiscover hidden/cloaked SSIDs
IoTScannerIdentify IoT devices on networks
NetworkMapperComplete network topology mapping
PasspointScannerHotspot 2.0 / Passpoint network discovery
ProbeHunterCapture and analyze probe requests
QuickScanFast area WiFi assessment
SignalTrackerTrack signal strength over time
SocialMapperMap social connections via device relationships
SpectrumAnalyzerChannel utilization and interference analysis
StealthReconLow-profile reconnaissance
VendorHuntIdentify devices by OUI/vendor lookup
WAP3ScannerWPA3/SAE network scanner
WPSScannerWPS-enabled network discovery
WiFiAuditComprehensive WiFi security audit
WiFiTimelineTemporal activity mapper โ€” tracks AP/client appear/disappear events over time

๐Ÿ”— Remote Access (4 payloads)

Remote control and persistent access.

PayloadDescription
TunnelRatReverse SSH tunnel with auto-reconnect
C2BeaconHTTP-based command & control beacon
PagerLinkRemote Pager UI access via SSH tunnel
VPNConnectWireGuard/OpenVPN connectivity

๐ŸŽญ Social Engineering (6 payloads)

Social engineering and phishing tools.

PayloadDescription
CoffeeShopAttackCoffee shop credential harvesting scenario
FakeUpdateFake software update portal
NullSecDefaceCustom web page injection
NullSecPortalNullSec-branded captive portal
PortalMasterAdvanced portal template management
SurveyPortalFake survey portal for data collection

๐Ÿ‘ป Stealth (11 payloads)

The most comprehensive stealth suite for any Pineapple payload collection.

PayloadDescription
GhostNetworkInvisible C2 channel using null SSID
HoneypotDecoy AP with attacker logging
LogWiperSecure log wiping (3-pass overwrite)
MACRotatorAutomatic MAC address rotation
MimicClone and impersonate legitimate APs
PhantomAppear/disappear on command
PoltergeistIntermittent interference causing confusion
SignalCloakMask signal presence and RF signatures
SpecterLong-duration low-profile surveillance
TrafficMaskDisguise Pineapple as normal device (7 profiles)
WraithChannel-hopping stealth operations

๐Ÿ”ง Utility (15 payloads)

System management and configuration tools.

PayloadDescription
BootOptimizerOptimize Pineapple boot performance
ChannelCongestionAnalyzes WiFi channel congestion, scores each channel, recommends optimal operating channel
FirewallManagerManage iptables rules from Pager UI
HeartbeatMonitorContinuous health monitoring for long engagements โ€” alerts on CPU, memory, temp, interface degradation
MACChangerChange MAC addresses (random/specific/vendor)
NullSecConfigNullSec Suite configuration management
PackageManagerManage opkg packages from Pager
PayloadUpdaterUpdate NullSec payloads from GitHub
QuickDiagQuick device diagnostics and health check
RangeExtenderExtend WiFi range with repeater mode
ScheduleTaskCron-based payload scheduling
SpeedTestInternet connection speed testing
SystemInfoComprehensive system information display
WaveRiderChannel-hopping target pursuit
WordlistManagerWordlist management for cracking

๐Ÿ›ก๏ธ Blue Team (8 payloads)

Defensive WiFi security monitoring and audit tools.

PayloadDescription
AuditReporterGenerates professional WiFi security audit reports with risk scoring
ComplianceAuditorAudits WiFi networks against security best practices (WPA3, WEP, open)
DeauthForensicsCaptures deauth frames and fingerprints attacker tools (aireplay, mdk3/4, bully, etc.)
RogueDetectorHunts for rogue APs, evil twins, and unauthorized SSIDs
RogueUSBGuardMonitors USB ports for unauthorized device insertions โ€” defends Pineapple from BadUSB/implants
SignalMapperMulti-point WiFi signal strength mapper for coverage analysis
WiFiGuardContinuous WiFi security monitor โ€” detects rogue APs, evil twins, deauth attacks
WirelessIDSWireless intrusion detection system

๐Ÿš€ Installation

git clone https://github.com/bad-antics/nullsec-pineapple-suite
cd nullsec-pineapple-suite
./install.sh

Option 2: Direct to Pineapple via SSH

ssh root@172.16.52.1 "cd /tmp && git clone https://github.com/bad-antics/nullsec-pineapple-suite && cd nullsec-pineapple-suite && ./install.sh"

Option 3: Manual Install via SSH

ssh root@172.16.52.1

# Create directories
mkdir -p /root/payloads/user/nullsec
mkdir -p /root/payloads/library
mkdir -p /mmc/root/themes/nullsec
mkdir -p /mmc/nullsec/{loot,captures/handshakes,captures/eap,logs/ids,scheduled}

# Clone and copy
cd /tmp && git clone https://github.com/bad-antics/nullsec-pineapple-suite
cp -r /tmp/nullsec-pineapple-suite/payloads/*/* /root/payloads/user/nullsec/
cp /tmp/nullsec-pineapple-suite/lib/*.sh /root/payloads/library/
cp -r /tmp/nullsec-pineapple-suite/theme/* /mmc/root/themes/nullsec/

# FastBoot (optional but recommended)
cp /tmp/nullsec-pineapple-suite/system/nullsec-fastboot /etc/init.d/
chmod +x /etc/init.d/nullsec-fastboot
/etc/init.d/nullsec-fastboot enable
/etc/init.d/nullsec-fastboot start

Option 4: USB Sideload

# On your computer
git clone https://github.com/bad-antics/nullsec-pineapple-suite
# Copy the repo folder to a USB drive, plug into Pineapple, then SSH in:

ssh root@172.16.52.1

# Create directories
mkdir -p /root/payloads/user/nullsec
mkdir -p /root/payloads/library
mkdir -p /mmc/root/themes/nullsec
mkdir -p /mmc/nullsec/{loot,captures/handshakes,captures/eap,logs/ids,scheduled}

# Copy from USB
cp -r /mnt/usb/nullsec-pineapple-suite/payloads/*/* /root/payloads/user/nullsec/
cp /mnt/usb/nullsec-pineapple-suite/lib/*.sh /root/payloads/library/
cp -r /mnt/usb/nullsec-pineapple-suite/theme/* /mmc/root/themes/nullsec/

# FastBoot (optional but recommended)
cp /mnt/usb/nullsec-pineapple-suite/system/nullsec-fastboot /etc/init.d/
chmod +x /etc/init.d/nullsec-fastboot
/etc/init.d/nullsec-fastboot enable
/etc/init.d/nullsec-fastboot start

Factory Reset Recovery

If you've factory-reset your Pineapple, use the full restore script to rebuild everything:

git clone https://github.com/bad-antics/nullsec-pineapple-suite
cd nullsec-pineapple-suite
./restore.sh

This installs tool dependencies (aircrack-ng, hcxdumptool, etc.), sets up SSH keys, deploys all payloads, theme, and FastBoot.

Requirements

  • WiFi Pineapple Pager (firmware 1.0+)
  • External WiFi adapter (for monitor mode payloads)
  • aircrack-ng suite (pre-installed on Pager)
  • Optional: nmap, hcxdumptool, reaver (install via PackageManager payload or restore.sh)

๐Ÿ“– Usage

Standard Mode

Dashboard โ†’ Payloads โ†’ User โ†’ nullsec โ†’ Select & Run

  1. Run a Recon payload first (QuickScan, WiFiAudit)
  2. Select a target from scan results
  3. Run Attack/Capture payloads โ€” target info auto-injected!

Workflow Examples

Handshake Capture:

QuickScan โ†’ HandshakeHunter โ†’ WPACracker โ†’ CloudExfil

Full Engagement:

WiFiAudit โ†’ EvilTwin โ†’ CredSniffer โ†’ DataVacuum โ†’ LootSync

Stealth Recon:

TrafficMask โ†’ StealthRecon โ†’ HiddenNetFinder โ†’ PasspointScanner

๐Ÿ“ Project Structure

nullsec-pineapple-suite/
โ”œโ”€โ”€ payloads/
โ”‚   โ”œโ”€โ”€ alerts/        # ๐Ÿšจ 7 monitoring & alerting payloads
โ”‚   โ”œโ”€โ”€ attack/        # โš”๏ธ 19 offensive payloads
โ”‚   โ”œโ”€โ”€ automation/    # ๐Ÿค– 5 automated attack chains
โ”‚   โ”œโ”€โ”€ capture/       # ๐Ÿ” 8 credential/handshake capture
โ”‚   โ”œโ”€โ”€ exfiltration/  # ๐Ÿ“ค 5 data extraction tools
โ”‚   โ”œโ”€โ”€ games/         # ๐ŸŽฎ 4 entertainment payloads
โ”‚   โ”œโ”€โ”€ interception/  # ๐Ÿ•ต๏ธ 5 MITM/traffic interception
โ”‚   โ”œโ”€โ”€ pranks/        # ๐ŸŽช 5 harmless WiFi pranks
โ”‚   โ”œโ”€โ”€ recon/         # ๐Ÿ” 23 reconnaissance payloads
โ”‚   โ”œโ”€โ”€ remote/        # ๐Ÿ”— 4 remote access tools
โ”‚   โ”œโ”€โ”€ social/        # ๐ŸŽญ 6 social engineering
โ”‚   โ”œโ”€โ”€ stealth/       # ๐Ÿ‘ป 11 stealth operations
โ”‚   โ”œโ”€โ”€ utility/       # ๐Ÿ”ง 15 system management tools
โ”‚   โ””โ”€โ”€ blue-team/     # ๐Ÿ›ก๏ธ 8 defensive security tools
โ”œโ”€โ”€ lib/               # Core libraries & helpers
โ”œโ”€โ”€ system/            # FastBoot optimizer init script
โ”œโ”€โ”€ theme/             # NullSec Pager theme (112 components)
โ”œโ”€โ”€ install.sh         # One-click installer
โ”œโ”€โ”€ restore.sh         # Full factory-reset recovery script
โ”œโ”€โ”€ LICENSE
โ””โ”€โ”€ README.md

ProjectDescription
nullsec-pineapple-opsWiFi Pineapple Ops Center โ€” web-based C2 dashboard
nullsec-linuxSecurity-focused Linux distro with 140+ tools
nullsec-flipper-suiteFlipper Zero payloads, animations & tools
nullsec-exploitExploit development framework
marshallNullSec Privacy Browser

๐Ÿค Contributing

Contributions welcome! See CONTRIBUTING.md for guidelines.

  1. Fork the repo
  2. Create your payload in the appropriate category
  3. Follow the payload template
  4. Submit a Pull Request

For authorized penetration testing and educational purposes ONLY.

  • โŒ Do NOT use without explicit written permission
  • โŒ Unauthorized network access is ILLEGAL
  • โœ… Get written authorization before any testing
  • โœ… Use only in controlled lab environments or with permission
  • โœ… You are solely responsible for your actions

The authors assume no liability for misuse of these tools.


๐Ÿ“Š Stats

MetricValue
Total Payloads125
Categories14
Largest CategoryRecon (23)
Theme Components112
Average Payload Size~150 lines
PlatformWiFi Pineapple Pager
Last UpdatedApril 2026

๐Ÿ“„ License

MIT License โ€” See LICENSE for details.


NullSec โ€” 125 ways to own the airwaves ๐Ÿ
github.com/bad-antics