View Issue Details

IDProjectCategoryView StatusLast Update
0009541Kali LinuxNew Tool Requestspublic2026-02-18 16:30
Reportervanguard Assigned Todaniruiz  
PrioritynormalSeverityminorReproducibilityhave not tried
Status resolvedResolutionfixed 
Fixed in Version2026.1 
Summary0009541: fluxion - security auditing and social-engineering research tool
Description

Dear maintainers,

maybe it could be possible, to add fluxion into kali live?

I searched, but I found no deb package for fluxion, so it has to be installed using git. But maybe for your experienced maintainers, it might be possible, to convert it into a deb package.

Thus it would be easy to add it into a kali livefile system or for users using apt.

At the moment, I am using a workaround for this problem: Using a native installed kali, then install fluxion via script, and when evrything is running, I am using bootcdwrite to

create a livesystem from the native. I know, it is not a nice solution, but I am not familiar with building debian packages, and so I had to look for another solution.

Any help is welcome!

Best regards

Hans

Activities

kali-bugreport

kali-bugreport

2026-02-13 16:15

reporter   ~0021333

Last edited: 2026-02-16 07:15

Kali team seems providing guidance/requirement to use a given template for requesting new tools here:

https://www.kali.org/docs/tools/submitting-tools/

daniruiz

daniruiz

2026-02-16 08:48

manager   ~0021348

To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will be for us):

[Name] - The name of the tool
[Already packaged] - Is the tool already packaged following Debian standard? A binary .deb is not sufficient.
[Willingness to package] - Is the tool creator willing to package the tool?
[Version] - What version of the tool should be added?
--- If it uses source control (such as git), please make sure there is a release to match (e.g. git tag).
[Activity] - When did the project start? Is it still actively being developed? When was the most recent tagged release? How often are commits tagged?
[Homepage] - Where can the tool be found online? Where to go to get more information?
[Download] - Where to go to get the tool? Either a download page or a link to the latest version.
[Author(s)] - Who made the tool? What is their contact information (email, git, etc)?
[License] - How is the software distributed? What conditions does it come with?
--- Note, sometimes tools will bundle third-party code under a different license. Does the tool include multiple licenses? Which license(s) apply to which parts of the code?
[Description] - What is the tool about? What does it do?
[Features] - What features does the tool have?

[Update and/or dependency checking] - Does the tool have an auto update feature? Can it be disabled? Does it check for dependencies? Can it be disabled?

[Programming language] - What is the code written in? What utilities are used?
--- Think something like a setup.py file or minified javascript files.
[Hardcoding] - Does the tool contain hardcoded directories and paths?
--- Something like /home/user/tool/file would cause issues with typical Debian packaging standards, please include mention of these cases.
[Dependencies] - What is needed for the tool to work?

[Missing] - Are there any dependencies that are missing?
[Old] - Does this tool require an old version of a dependency? Which version?

[Kaboxer] - Is this tool a candidate for Kaboxer?
[Similar tools] - What other tools are out there that can be used for the same purpose?
[How to install] - How do you compile it?
--- Note, using source code to acquire (e.g. git clone or svn checkout) can't be used - Also downloading from the head. Please use a "tag" or "release" version.

[System-wide installation] - Does the tool support system-wide installation?

[How to use] - What are some basic commands/functions to demonstrate it?
[Pentest use case] - In what way is this tool used in a Pentest?

vanguard

vanguard

2026-02-17 14:18

reporter   ~0021356

Name] - fluxion

[Already packaged] – There is no package available and the author seems not interested in it.

[Willingness to package] – No, it looks like there is no interest by the author to package it.

[Version] – Latest version is 6.20.

[Activity] – The project started in 2023 and it is still actively being developed. The most recent tagged release was yesterday (16.02.2026). Commits are daily/weekly tagged.

[Homepage] – You can find the tool online here: https://github.com/FluxionNetwork/fluxion., you get more information also here: https://fluxionnetwork.github.io/fluxion/

[Download] – Fluxion is downloadable via git here:
git clone https://www.github.com/FluxionNetwork/fluxion.git

[Author(s)] – The authors are named as:
l3op - contributor

  1. dlinkproto - contributor
  2. vk496 - developer of linset
  3. Derv82 - @Wifite/2
  4. Princeofguilty - @webpages and @buteforce
  5. Ons Ali @wallpaper
  6. PappleTec @sites
  7. MPX4132 - Fluxion V3
  8. usama7628674 - contributor
  9. cjb900 - moderator
    You can contact them via discord:
    https://discord.gg/G43gptk

[License] – License is GPL. Please note:
Authors do not own the logos under the /attacks/Captive Portal/sites/ directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.

[Description] - Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) fewer bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It’s compatible with the latest release of Kali (rolling).

[Features] – Fluxion is multilingual. It can harvest wlan credentials and create an evil twin.
[Update and/or dependency checking] – The tool has autoupdate at start (can be overgone, when wanted) It can check for dependencies at start (using commandline), which will then automatically doenload and install dependencies. Can be overgone, when not wanted.
The dependencies are:
[] aircrack-ng...................................... OK.                                      
                                     [
] bc............................................... OK.                                      
                                     [] awk.............................................. OK.                                      
                                     [
] curl............................................. OK.                                      
                                     [] cowpatty......................................... OK.                                      
                                     [
] dhcpd....................................... OK!                                      
                                     [] 7zr.............................................. OK.                                      
                                     [
] hostapd..................................... OK!                                      
                                     [] lighttpd.................................... OK!                                      
                                     [
] iw.......................................... OK!                                      
                                     [] macchanger....................................... OK.                                      
                                     [
] mdk4........................................ OK!                                      
                                     [] dsniff...................................... OK!                                      
                                     [
] nmap............................................. OK.                                      
                                     [] openssl.......................................... OK.                                      
                                     [
] php-cgi.......................................... OK.                                      
                                     [] rfkill...................................... OK!                                      
                                     [
] unzip............................................ OK.                                      
                                     [] route....................................... OK!                                      
                                     [
] fuser............................................ OK.                                      
                                     [] killall.......................................... OK.                                      
                                     [
] iptables.................................... OK!                                      
                                     [] iptables-save............................... OK!                                      
                                     [
] iptables-restore............................ OK!                                      
                                     [*] xterm............................................ OK.  

[Programming language] – The code is written in bash.

[Hardcoding] - The tool contain no hardcoded directories and paths?

[Dependencies] – You need a linux system and wireless hardware.
[Missing] – see above

[Old] - This tool require no old version of a dependency.
[Kaboxer] - Is this tool a candidate for Kaboxer?
Do not know, what is kaboxer?

[Similar tools] - Tools are out there that can be used for similar purpose are airgeddon, wifite, eaphammer, wifipumpkin3, wifiphisher

[How to install] – Installation is done by git clone:
git clone https://www.github.com/FluxionNetwork/fluxion.git

[System-wide installation] - The tool support system-wide installation.
[How to use] – You have to own root rights.
Important note: There is different behaviour, when you start it!

  1. Best options are starting X, then go to /opt/fluxion/ and enter the command „./fluxion.sh“.
  2. Second option: As normal user in X started as user, open shell and cd to /opt/fluxion/. From here start fluxion by using command „sudo ./fluxion.sh“.
  3. When starting as normal user from any other directory using „sudo /opt/fluxion/fluxion.sh“ will start, but will NOT find all plugins. This might be a general linux issue.
  4. When in X as normal user and then change to become root with the command „su -p“, you can start fluxion. But there are missbehaviours, According to, if started ./fluxion.sh from within directory „/opt/fluxion/“ or from outside like „/opt/fluxion/fluxion.sh“, the tool either does not find the language settings or not all plugins and dependencies. Maybe a general linux issue, too.

[Pentest use case] - This tool is usefull in a Pentest to show weak credentials or MITM-Attacks and can people make learn to be more sensible in wireless environments.

daniruiz

daniruiz

2026-02-18 16:30

manager   ~0021361

This tool is now packaged in Kali and should be ready in kali-rolling in a few days.

Thanks for the report ;)

https://gitlab.com/kalilinux/packages/fluxion

Issue History

Date Modified Username Field Change
2026-02-13 10:21 vanguard New Issue
2026-02-13 16:15 kali-bugreport Note Added: 0021333
2026-02-16 07:15 kali-bugreport Note Edited: 0021333
2026-02-16 08:48 daniruiz Note Added: 0021348
2026-02-16 15:07 daniruiz Summary Can fluxion be added to kali? => fluxion - security auditing and social-engineering research tool
2026-02-17 14:18 vanguard Note Added: 0021356
2026-02-18 16:30 daniruiz Note Added: 0021361
2026-02-18 16:30 daniruiz Assigned To => daniruiz
2026-02-18 16:30 daniruiz Status new => resolved
2026-02-18 16:30 daniruiz Resolution open => fixed
2026-02-18 16:30 daniruiz Fixed in Version => 2026.1