Small network offensive toolkit for Raspberry Pi (+ Waveshare 1.44″ LCD HAT).
⚠️ For educational and authorized testing purposes only, always use responsibly and legally.RaspyJack is an offensive security toolkit intended for cybersecurity professionals, researchers, penetration testers, and ethical hackers.
Any use on networks or systems without the explicit consent of the owner is illegal and strictly prohibited.The author cannot be held responsible for any misuse or unlawful activity involving this project
Full responsibility for any use of this tool rests solely with the user..
Join the Evil-M5 discord for help and updates on RaspyJack channel😉:
| Category | Built‑in actions |
|---|---|
| Recon | Multiple customizable Nmap scan |
| Shells | One‑click reverse shell with IP selection or preconfigured IP |
| Creds capture | Responder, ARP MITM + sniff, DNS‑spoof phishing |
| Loot viewer | Read Nmap scan / Responder / DNSSpoof logs on‑device |
| File browser | Lightweight text & image explorer |
| System | Theme editor, config save/restore, UI restart, shutdown |
| Custom Script | Custom python script can be added |
| WiFi Attacks | Deauth attacks, WiFi interface management, USB dongle support |
| Boot time | On rpi 0w2 : ~22sec |
| Item | Description | Buy |
|---|---|---|
| Waveshare 1.44″ LCD HAT | SPI TFT + joystick + 3 buttons | Buy 🔗 or Buy 🔗 |
| Raspberry Pi Zero 2 WH | Quad-core 1 GHz, 512 MB RAM – super compact | Buy 🔗 |
| RPI 0w with Waveshare Ethernet/USB HUB HAT | 3 USB + 1 Ethernet | Buy 🔗 |
| Alternative : Dual Ethernet/USB HUB HAT | 2 USB + 2 Ethernet | Buy 🔗 |
Others hardwares :
| Item | Description | Buy |
|---|---|---|
| Raspberry Pi 4 Model B (4 GB) | Quad-core 1.5 GHz, full-size HDMI, GigE LAN | Buy 🔗 |
| Raspberry Pi 5 (8 GB) | Quad-core Cortex-A76 2.4 GHz, PCIe 2.0 x1 | Buy 🔗 |
*not tested yet on Raspberry Pi 5 feedback are welcome in issue for tested working devices
| Dongle | Chipset | Monitor Mode | Buy |
|---|---|---|---|
| Alfa AWUS036ACH | Realtek RTL8812AU | ✅ Full support | |
| TP-Link TL-WN722N v1 | Atheros AR9271 | ✅ Full support | |
| Panda PAU09 | Realtek RTL8812AU | ✅ Full support |
Features:
- Deauth attacks on 2.4GHz and 5GHz networks
- Multi-target attacks with interface switching
- Automatic USB dongle detection and setup
- Research-based attack patterns for maximum effectiveness
note : This installation is for a Raspberry Pi 0w2 (can probably be customized for others rpi).
You can now connect to it on ssh using
ssh raspyjack@<IP> sudo apt install git
sudo su
cd
git clone https://github.com/7h30th3r0n3/raspyjack.git
mv raspyjack Raspyjack
cd Raspyjack
chmod +x install_raspyjack.sh
sudo ./install_raspyjack.sh
sudo rebootNote : Depending on the way you get the project Raspyjack-main can take multiple name. Just be sure that Raspyjack folder are in /root.
sudo su
cd /root
rm -rf Raspyjack
git clone https://github.com/7h30th3r0n3/raspyjack.git
mv raspyjack Raspyjack
sudo rebootFor WiFi attacks, you need a USB WiFi dongle:
- Plug in USB WiFi dongle (see requirements above)
- Run WiFi Manager from RaspyJack menu
- Configure WiFi profiles for auto-connect
- Test interface switching between wlan0/wlan1
- Run deauth attacks on target networks
Quick Test:
cd /root/Raspyjack/payloads
python3 fast_wifi_switcher.py| Key | Action |
|---|---|
| ↑ / ↓ | navigate |
| → or OK | enter / validate |
| ← or BACK | go back |
| Q (KEY1) | toggle view mode / extra in dialogs |
RaspyJack features three different view modes to navigate the main menu! Press KEY1 to cycle through them:
- Classic vertical scrolling list
- Shows 7 items at once with smooth scrolling
- Perfect for quick navigation
- Displays icons alongside menu text
- Compact 2×4 grid layout showing 8 items
- Great for seeing multiple options at once
- Navigate with directional arrows
- Ideal for overview of all tools
- Single-item display with icons centered
- Shows one tool at a time with detailed focus
- Wraparound navigation - seamlessly cycle from last to first
- Features prominent icons and clear tool names
How to switch: Simply press the KEY1 while on the main menu to cycle through: List → Grid → Carousel → List
Choose the one that fits your workflow best! 🚀
RaspyJack supports Discord webhook integration for Nmap scan results! Get instant notifications with full scan details and a downloadable .txt file of the Nmap results directly in your Discord server.
-
Create a Discord Webhook:
- Go to your Discord server
- Right-click on a channel → Edit Channel → Integrations → Webhooks
- Click "New Webhook"
- Copy the webhook URL
-
Configure RaspyJack:
- Edit
/root/Raspyjack/discord_webhook.txt - Replace the placeholder with your actual webhook URL:
https://discord.com/api/webhooks/YOUR_WEBHOOK_ID/YOUR_WEBHOOK_TOKEN - Edit
-
Restart RaspyJack to load the configuration
When any Nmap scan completes, you'll get a Discord message with:
- Scan type and target network
- Interface used for scanning
- Timestamp of completion
- Complete scan results as a downloadable file attachment
- File information (filename, size)
- Color-coded embed for easy identification
- Scan results are sent as
.txtfiles - Files are automatically named with scan type and timestamp
- Discord supports files up to 25MB (plenty for Nmap results)
- No more character limits or truncated output!
Check your webhook status in Network Info:
- ✅ Webhook configured - Ready to send notifications
- ❌ No webhook - Configuration needed
Works with all Nmap scan types:
- Quick Scan, Full Port Scan, Service Scan
- Vulnerability Scan, OS Scan, Intensive Scan
- Stealth SYN Scan, UDP Scan, Ping Sweep
- Top100 Scan, HTTP Enumeration
Note: If no webhook is configured, scans will still save results locally - no functionality is lost!
raspyjack/
├── raspyjack.py
├── install.sh
├── gui_conf.json
├── LCD_1in44.py
├── LCD_1in44.pyc
├── LCD_Config.py
├── LCD_Config.pyc
│
├── img/
│ └── logo.bmp
│
├── wifi/
│ ├── raspyjack_integration.py
│ ├── wifi_manager.py
│ ├── wifi_lcd_interface.py
│ └── profiles/
│
├── payloads/
│ ├── example_show_buttons.py
│ ├── exfiltrate_discord.py
│ ├── snake.py
│ ├── deauth.py
│ ├── fast_wifi_switcher.py
│ └── wifi_manager_payload.py
│
├── DNSSpoof/
│ ├── captures/
│ └── sites/
│
├── loot/
│ ├── MITM/
│ └── Nmap/
│
└── Responder/
Educational & authorised testing only – use responsibly.
Due to multiple event during the devellopement I recommand to NEVER put any brevage around the project.
Considering this note we are not reliable to any mistake or miss use of this kind.