WarBerryPi – Turn your Raspberry Pi into a War Machine


To get a list of all options and switches use:

sudo python -h

-h,  --help         [*] Print this help banner
-m,  --man          [*] Prints WarBerry's Man Page
-A,  --attack       [*] Run All Enumeration Scripts
-S,  --sniffer      [*] Run Sniffing Modules Only
-C,  --clear        [*] Clear Output Directories
-F,  --fulltcp      [*] Full TCP Port Scan
-T,  --toptcp       [*] Top Port Scan
-U,  --topudp       [*] Top UDP Port Scan

example usage: sudo python -A
               sudo python --attack
               sudo python -C

Optional: Change the hostname of the RaspberryPi to WarBerry
sudo nano /etc/hosts
sudo nano /etc/hostname
Reboot the WarBerry for the changes to take effect
Create a directory under /home/pi
sudo mkdir WarBerry
Create the Results subdirectory in /WarBerry
sudo mkdir Results
Download WarBerry by cloning the Git repository:
sudo git clone

The tool in case of MAC address filtering enumerates by default the subnets specified under/home/pi/WarBerry/warberry/discover . This is done for the tool to run quicker. If you want to enumerate more subnets either add the subnets in that file or change line 154 in so that it does not read from the file.


  • sudo apt-get install nbtscan
  • sudo apt-get install python-scapy
  • sudo apt-get install tcpdump
  • sudo apt-get install nmap
  • sudo pip install python-nmap
  • sudo pip install ipaddress
  • sudo apt-get install ppp
  • sudo apt-get install sg3-utils
  • sudo apt-get install netdiscover
  • sudo apt-get install macchanger
  • sudo git clone #install in /home/pi/WarBerry/Tools/

Extra Tools for Post Exploitation. Best to install in /home/pi/WarBerry/Tools/ directory

Aircrack Installation


Running the tool with a switch

Connect to GND and port 23 pins on the RPi.

Script for autorunning with a switch

#!/usr/bin/env python2.7
import RPi.GPIO as GPIO
import subprocess

# GPIO 23 set up as input. It is pulled up to stop false signals
GPIO.setup(23, GPIO.IN, pull_up_down=GPIO.PUD_UP)

print "it will connect GPIO port 23 (pin 16) to GND (pin 6)\n"

print "Waiting for falling edge on port 23"

    GPIO.wait_for_edge(23, GPIO.FALLING)["python /home/pi/WarBerry/warberry/ -A"])

except KeyboardInterrupt:
    GPIO.cleanup()       # clean up GPIO on CTRL+C exit
GPIO.cleanup()           # clean up GPIO on normal exit


Bt2 – Blaze Telegram Backdoor Toolkit

Previous article

Root Me: aprende hacking rompiendo y jugando

Next article

You may also like


Leave a reply

Your email address will not be published. Required fields are marked *

More in GNU/Linux