Make a wireless network unresponsive
Tested on Kali Nethunter | Works for both IPv6 and IPv4
DeadNet is a cross-platform network security tool that combines offensive testing (Attacker) and defensive monitoring (Defender) in a single unified interface. Test network resilience with ARP Poisoning, IPv6 RA Spoofing, Dead Router attacks, while simultaneously detecting and countering these threats in real-time.
This is an enhanced fork of: https://github.com/flashnuke/deadnet
| Attacker | Defender | About |
|---|---|---|
![]() |
![]() |
![]() |
DeadNet is a Python application specifically designed for Windows 10/11. With a modern web interface built with Vite + TailwindCSS, DeadNet can be used by IT security professionals to:
- Temporarily disable network connectivity during testing (DoS Test)
- Test security system detection against ARP and NDP attacks
- Simulate network attacks with controlled intensity and attack parameters
- Test network awareness against IP/MAC spoofing
- Real-time packet monitoring and threat detection
- Detect ARP spoofing, IPv6 RA spoofing, and Dead Router attacks
- Auto-flag suspicious IPs and MAC addresses
WARNING: Use only on networks you own or have written permission for! Misuse of this tool is illegal!
In IPv6, the ARP mechanism was ditched due to several reasons, one of them being lack of security. Instead there is Neighbor/Router Discovery Protocol, which will be exploited in this attack.
Dead Router Attack - This attack periodically sends a spoofed RA (router discovery) packet with the gateway's link-local address to the multicast address on the local link, which signals that the router is dead. This would prevent the hosts from forwarding traffic to the gateway. Furthermore, a scapy method is running on a separate thread in the background, sniffing traffic. It immediately invalidates all incoming RA packets from routers by sending spoofed ones that indicate the router is not operational (routerlifetime=0).
ARP Attack - Continuously sends spoofed ARP packets (using scapy) to every host on the network, poisoning its ARP table. The gateway is mapped to an incorrect MAC address and therefore the traffic never reaches its true destination, making the network unresponsive. Furthermore, the gateway also receives an ARP packet from each host that contains a spoofed MAC address.
There's another way to perform a DoS attack on wireless networks WITHOUT HAVING CREDENTIALS, and that is by sending de-auth packets. This requires a network adapter that supports packet injection. If no credentials are present and you insist on using DeadNet, it's possible to run a dictionary-attack using a wordlist in combination with another tool that cracks WiFi handshakes to gain credentials first.
Works on Windows, Linux, Mac, and Android (Termux with root).
| Platform | Support | Notes |
|---|---|---|
| Windows 10/11 | β Full | WebView + Browser mode |
| Linux | β Full | Browser mode (WebView optional) |
| Mac | β Full | Browser mode |
| Android (Termux) | β Full | Requires root, Browser mode only |
Install 3rd party libraries by running:
pip install -r requirements.txtRequired packages:
scapy- Packet manipulationnetifaces- Network interface infoflask- Web serverflask-cors- CORS supportpywebview- Desktop window (optional)
# Clone repository
git clone https://github.com/risunCode/Deadnet-Windows.git
cd Deadnet-Windows
# Run launcher
# Windows:
launcher.cmd
# Linux/Mac:
chmod +x launcher.sh && sudo ./launcher.shRequirements: Termux from F-Droid + Rooted device (Magisk/KernelSU)
One-Line Install:
pkg update && pkg install -y python git wget clang libffi openssl && wget -qO- https://raw.githubusercontent.com/risunCode/Deadnet-Windows/main/install-deadnet-android.sh | bashRun DeadNet:
deadnet(restart terminal after install, or run source ~/.bashrc first)
Update DeadNet:
cd ~/deadnet && git pullThen open browser: http://127.0.0.1:5000
π Manual Installation (click to expand)
Step 1: Install dependencies
pkg update && pkg install -y python git wget clang libffi opensslStep 2: Install Python packages
pip install scapy netifaces flask flask-corsStep 3: Clone repository
git clone https://github.com/risunCode/Deadnet-Windows.git ~/deadnetStep 4: Run
deadnetOr full command: su -c "/data/data/com.termux/files/usr/bin/python /data/data/com.termux/files/home/deadnet/main.py --browser"
ποΈ Uninstall (click to expand)
rm -rf ~/deadnet && sed -i '/alias deadnet/d' ~/.bashrcOption 1: Using Launcher (Recommended)
# Windows
launcher.cmd
# Linux/Mac
sudo ./launcher.sh
# Android (Termux)
deadnetOption 2: Command Line
python main.py [options]
Options:
-b, --browser Run in browser mode
-w, --webview Run in WebView mode (default on Windows)
-p, --port PORT Server port (default: 5000)
--no-open Don't auto-open browser| Method | Endpoint | Description |
|---|---|---|
| GET | /api/status |
Get attack status & statistics |
| GET | /api/logs |
Get activity logs |
| GET | /api/interfaces |
List network interfaces |
| POST | /api/start |
Start attack |
| POST | /api/stop |
Stop attack |
| Method | Endpoint | Description |
|---|---|---|
| GET | /api/defender/status |
Get monitor status |
| GET | /api/defender/alerts |
Get security alerts |
| GET | /api/defender/flagged |
Get flagged IPs/MACs |
| POST | /api/defender/start |
Start monitoring |
| POST | /api/defender/stop |
Stop monitoring |
| POST | /api/defender/unflag |
Remove flagged address |
| POST | /api/defender/clear_flags |
Clear all flags |
| Method | Endpoint | Description |
|---|---|---|
| POST | /api/shutdown |
Panic exit - stop all & shutdown |
| POST | /api/minimize |
Minimize window |
| Theme | Description |
|---|---|
| Hacker | Green terminal style (default) |
| Maroon | Red/dark theme |
| Defender | Blue security theme |
| Pure Dark | Minimal monochrome |
This tool is only for testing and can only be used where strict consent has been given. Do not use it for illegal purposes!
It is the end user's responsibility to obey all applicable local, state and federal laws. I assume no liability and am not responsible for any misuse or damage caused by this tool and software.
Distributed under the GNU General Public License v3.0.
- Original DeadNet by @flashnuke
- Enhanced fork by @risunCode
By using DeadNet, you agree to act ethically, legally, and professionally.


