Skip to content

Small offensive network toolkit for Raspberry Pi (+ Waveshare 1.44″ LCD HAT) inspired by sharkjack fonctionnalities. For redteam and educational purposes only.

License

Notifications You must be signed in to change notification settings

7h30th3r0n3/Raspyjack

Repository files navigation

RaspyJack

Small network offensive toolkit for Raspberry Pi (+ Waveshare 1.44″ LCD HAT).

⚠️ For educational and authorized testing purposes only, always use responsibly and legally.

RaspyJack is an offensive security toolkit intended for cybersecurity professionals, researchers, penetration testers, and ethical hackers.
Any use on networks or systems without the explicit consent of the owner is illegal and strictly prohibited.

The author cannot be held responsible for any misuse or unlawful activity involving this project

Full responsibility for any use of this tool rests solely with the user..


Join the Evil-M5 discord for help and updates on RaspyJack channel😉:

Join Discord

✨ Features

Category Built‑in actions
Recon Multiple customizable Nmap scan
Shells One‑click reverse shell with IP selection or preconfigured IP
Creds capture Responder, ARP MITM + sniff, DNS‑spoof phishing
Loot viewer Read Nmap scan / Responder / DNSSpoof logs on‑device
File browser Lightweight text & image explorer
System Theme editor, config save/restore, UI restart, shutdown
Custom Script Custom python script can be added
WiFi Attacks Deauth attacks, WiFi interface management, USB dongle support
Boot time On rpi 0w2 : ~22sec

🛠 Hardware

Item Description Buy
Waveshare 1.44″ LCD HAT SPI TFT + joystick + 3 buttons Buy 🔗
or
Buy 🔗
Raspberry Pi Zero 2 WH Quad-core 1 GHz, 512 MB RAM – super compact Buy 🔗
RPI 0w with Waveshare Ethernet/USB HUB HAT 3 USB + 1 Ethernet Buy 🔗
Alternative : Dual Ethernet/USB HUB HAT 2 USB + 2 Ethernet Buy 🔗

Others hardwares :

Item Description Buy
Raspberry Pi 4 Model B (4 GB) Quad-core 1.5 GHz, full-size HDMI, GigE LAN Buy 🔗
Raspberry Pi 5 (8 GB) Quad-core Cortex-A76 2.4 GHz, PCIe 2.0 x1 Buy 🔗

*not tested yet on Raspberry Pi 5 feedback are welcome in issue for tested working devices


📡 WiFi Attack Requirements

⚠️ Important: The onboard Raspberry Pi WiFi (Broadcom 43430) cannot be used for WiFi attacks due to hardware limitations.

Required USB WiFi Dongles for WiFi Attacks:

Dongle Chipset Monitor Mode Buy
Alfa AWUS036ACH Realtek RTL8812AU ✅ Full support
TP-Link TL-WN722N v1 Atheros AR9271 ✅ Full support
Panda PAU09 Realtek RTL8812AU ✅ Full support

Features:

  • Deauth attacks on 2.4GHz and 5GHz networks
  • Multi-target attacks with interface switching
  • Automatic USB dongle detection and setup
  • Research-based attack patterns for maximum effectiveness

🚀 Installation and Setup

Part 1 : setup OS

note : This installation is for a Raspberry Pi 0w2 (can probably be customized for others rpi).

Install Raspberry Pi imager


Select Raspberry Pi Zero 2 W


Go in Raspberry Pi OS (other)


Select Raspberry Pi OS Lite (32-bit)


Select your SD card


Change settings to configure user and enable SSH



Set username and password and enable SSH


You can now connect to it on ssh using

ssh raspyjack@<IP> 

Part 2 : setup Raspyjack

sudo apt install git
sudo su
cd
git clone https://github.com/7h30th3r0n3/raspyjack.git
mv raspyjack Raspyjack
cd Raspyjack
chmod +x install_raspyjack.sh
sudo ./install_raspyjack.sh
sudo reboot

Note : Depending on the way you get the project Raspyjack-main can take multiple name. Just be sure that Raspyjack folder are in /root.

Update

⚠️ Before updating backup your loot.

sudo su
cd /root
rm -rf Raspyjack
git clone https://github.com/7h30th3r0n3/raspyjack.git
mv raspyjack Raspyjack
sudo reboot

Part 3 : WiFi Attack Setup (Optional)

For WiFi attacks, you need a USB WiFi dongle:

  1. Plug in USB WiFi dongle (see requirements above)
  2. Run WiFi Manager from RaspyJack menu
  3. Configure WiFi profiles for auto-connect
  4. Test interface switching between wlan0/wlan1
  5. Run deauth attacks on target networks

Quick Test:

cd /root/Raspyjack/payloads
python3 fast_wifi_switcher.py

🎮 Keymap

Key Action
↑ / ↓ navigate
→ or OK enter / validate
← or BACK go back
Q (KEY1) toggle view mode / extra in dialogs

🎨 View Modes

RaspyJack features three different view modes to navigate the main menu! Press KEY1 to cycle through them:

📋 List View (Default)

  • Classic vertical scrolling list
  • Shows 7 items at once with smooth scrolling
  • Perfect for quick navigation
  • Displays icons alongside menu text

🔲 Grid View

  • Compact 2×4 grid layout showing 8 items
  • Great for seeing multiple options at once
  • Navigate with directional arrows
  • Ideal for overview of all tools

🔄 Carousel View

  • Single-item display with icons centered
  • Shows one tool at a time with detailed focus
  • Wraparound navigation - seamlessly cycle from last to first
  • Features prominent icons and clear tool names

How to switch: Simply press the KEY1 while on the main menu to cycle through: List → Grid → Carousel → List

Choose the one that fits your workflow best! 🚀


📡 Discord Webhook Integration

RaspyJack supports Discord webhook integration for Nmap scan results! Get instant notifications with full scan details and a downloadable .txt file of the Nmap results directly in your Discord server.

🔧 Setup Instructions

  1. Create a Discord Webhook:

    • Go to your Discord server
    • Right-click on a channel → Edit ChannelIntegrationsWebhooks
    • Click "New Webhook"
    • Copy the webhook URL
  2. Configure RaspyJack:

    • Edit /root/Raspyjack/discord_webhook.txt
    • Replace the placeholder with your actual webhook URL:
    https://discord.com/api/webhooks/YOUR_WEBHOOK_ID/YOUR_WEBHOOK_TOKEN
    
  3. Restart RaspyJack to load the configuration

📊 What You'll Receive

When any Nmap scan completes, you'll get a Discord message with:

  • Scan type and target network
  • Interface used for scanning
  • Timestamp of completion
  • Complete scan results as a downloadable file attachment
  • File information (filename, size)
  • Color-coded embed for easy identification

📁 File Attachments

  • Scan results are sent as .txt files
  • Files are automatically named with scan type and timestamp
  • Discord supports files up to 25MB (plenty for Nmap results)
  • No more character limits or truncated output!

✅ Status Check

Check your webhook status in Network Info:

  • ✅ Webhook configured - Ready to send notifications
  • ❌ No webhook - Configuration needed

🔄 Supported Scans

Works with all Nmap scan types:

  • Quick Scan, Full Port Scan, Service Scan
  • Vulnerability Scan, OS Scan, Intensive Scan
  • Stealth SYN Scan, UDP Scan, Ping Sweep
  • Top100 Scan, HTTP Enumeration

Note: If no webhook is configured, scans will still save results locally - no functionality is lost!


📂 Layout

raspyjack/
├── raspyjack.py
├── install.sh
├── gui_conf.json
├── LCD_1in44.py
├── LCD_1in44.pyc
├── LCD_Config.py
├── LCD_Config.pyc
│
├── img/
│   └── logo.bmp
│
├── wifi/
│   ├── raspyjack_integration.py
│   ├── wifi_manager.py
│   ├── wifi_lcd_interface.py
│   └── profiles/
│
├── payloads/
│   ├── example_show_buttons.py
│   ├── exfiltrate_discord.py
│   ├── snake.py
│   ├── deauth.py
│   ├── fast_wifi_switcher.py
│   └── wifi_manager_payload.py
│
├── DNSSpoof/
│   ├── captures/
│   └── sites/
│
├── loot/
│   ├── MITM/
│   └── Nmap/
│
└── Responder/

🛡️ Disclaimer

Educational & authorised testing only – use responsibly.


Acknowledgements


⚠️ NOTE WARNING ! Coffee, coke and lemonade can cause a DoS on the equipment if spilled on it. ⚠️
Due to multiple event during the devellopement I recommand to NEVER put any brevage around the project.
Considering this note we are not reliable to any mistake or miss use of this kind.

About

Small offensive network toolkit for Raspberry Pi (+ Waveshare 1.44″ LCD HAT) inspired by sharkjack fonctionnalities. For redteam and educational purposes only.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •