Command & Control Dashboard for WiFi Pineapple Pager and Mark VII
A web-based operations center for managing WiFi Pineapple devices during authorized security assessments. Deploy payloads, run recon scans, collect loot, and generate professional audit reports β all from a single dashboard.
- Real-time operations overview with animated radar, activity feed, and device status
- 4 color themes β NullSec (blue), Crimson (red), Matrix (green), Phantom (purple)
- Boot sequence with matrix rain animation and system checks
- Background effects β floating particles, grid overlay, CRT scanlines
- Connect to multiple Pineapple Pager and Mark VII devices via SSH
- Real-time device status, version, uptime, and storage monitoring
- One-click connect/disconnect with auto-discovery
- Browse all payloads by platform (Pager / Mark VII) and category
- Syntax-highlighted payload viewer with metadata display
- One-click deploy via SCP to connected devices
- Deploy & Run for Mark VII bash payloads
- Live recon scanning via airodump-ng with real-time WebSocket updates
- Signal strength chart β color-coded by security protocol
- Security breakdown β visual WPA3/WPA2/WEP/Open distribution bars
- AP table β sortable network inventory with signal bars
- Demo mode β generates realistic scan data for testing without hardware
- Pull captured data from devices (handshakes, credentials, logs)
- Built-in file browser and content viewer
- Automatic collection from standard loot directories
- Generate professional HTML security audit reports
- Includes risk scoring, findings, recommendations, and full network inventory
- NullSec branded with dark theme styling
- SSH command execution directly from the dashboard
- Command history with arrow key navigation
- Color-coded output (commands, results, errors)
| Payload | Category | Description |
|---|---|---|
| WiFi Guard | Blue Team | Continuous monitoring for rogue APs, evil twins, deauth attacks |
| Compliance Auditor | Blue Team | Checks all APs against security policy (WPA3, WPS, etc.) |
| Rogue AP Detector | Blue Team | Hunts for evil twins and unauthorized access points |
| Signal Mapper | Recon | Multi-point signal strength mapping for coverage analysis |
| Audit Reporter | Reporting | Generates comprehensive WiFi security assessment reports |
| Payload | Category | Description |
|---|---|---|
| wifi-guard.sh | Blue Team | Continuous security monitor with alert logging |
| compliance-auditor.sh | Blue Team | WiFi compliance audit with pass/fail scoring |
| rogue-detector.sh | Blue Team | Evil twin detection with AP whitelist support |
| signal-mapper.sh | Recon | Multi-location signal mapping with CSV export |
| audit-reporter.sh | Reporting | Professional audit report with risk scoring |
# Clone the repo
git clone https://github.com/bad-antics/nullsec-pineapple-ops.git
cd nullsec-pineapple-ops
# Install dependencies
chmod +x install.sh
./install.sh
# Start the Ops Center
python3 server.pyOpen http://localhost:1337 in your browser.
Edit config.json to set defaults:
{
"devices": [],
"settings": {
"theme": "nullsec",
"default_ssh_port": 22,
"default_user": "root",
"default_pager_ip": "172.16.52.1",
"scan_duration": 30,
"scan_interface": "wlan1mon"
}
}OPS_PORTβ Server port (default: 1337)
OPS_PORT=8080 python3 server.pynullsec-pineapple-ops/
βββ server.py # Flask + SocketIO backend
βββ config.json # Device & settings config
βββ requirements.txt # Python dependencies
βββ install.sh # Setup script
βββ templates/
β βββ dashboard.html # Main dashboard UI
βββ static/
β βββ css/style.css # NullSec dark theme
β βββ js/app.js # Frontend logic
βββ payloads/
β βββ pager/ # DuckyScript payloads
β β βββ wifi-guard/
β β βββ compliance-auditor/
β β βββ rogue-detector/
β β βββ signal-mapper/
β β βββ audit-reporter/
β βββ mark7/ # Bash scripts
β βββ wifi-guard.sh
β βββ compliance-auditor.sh
β βββ rogue-detector.sh
β βββ signal-mapper.sh
β βββ audit-reporter.sh
βββ loot/ # Collected loot (auto-created)
βββ reports/ # Generated reports (auto-created)
Switch themes in Settings or via localStorage:
| Theme | Accent Color | Style |
|---|---|---|
| NullSec | #58a6ff Blue |
Default hacker aesthetic |
| Crimson | #f85149 Red |
Aggressive red ops |
| Matrix | #3fb950 Green |
Classic green terminal |
| Phantom | #a371f7 Purple |
Stealth purple |
This ops center is designed to work alongside the NullSec Pineapple Suite β 96+ payloads for the WiFi Pineapple Pager.
This tool is designed for authorized security testing and educational purposes only. Unauthorized access to computer networks is illegal. Always obtain proper written authorization before conducting any security assessment. The authors assume no liability for misuse.
MIT License β Β© 2024-2026 bad-antics β’ NullSec Security