A local web hub combining OSINT research, WiFi handshake cracking, and Flipper Zero file management β all in one interface.
| Tab | Description |
|---|---|
| π OSINT | Username / email β full digital portrait via VK, Maigret (500+ sites), HaveIBeenPwned, AI analysis |
| π‘ WiFi Cracker | Drop a .pcap β convert β crack with hashcat. Multi-SSID, real-time terminal output |
| π¬ Flipper Zero | Browse SD card over USB, download .pcap files directly to PC |
Python packages
pip install Flask flask-cors pyserial
External tools
| Tool | Purpose |
|---|---|
| hashcat 7.x | GPU WPA cracking (-m 22000) |
| WSL + hcxpcapngtool | Convert .pcap β .hc22000 |
| Wireshark | EAPOL frame analysis (tshark) |
| CUDA Toolkit | NVIDIA GPU acceleration (optional, ~3Γ speedup) |
Wordlists β place .txt files in C:\HashCat\hashcat-7.1.2\, KikiHub picks them all up automatically.
Recommended: weakpass.com β weakpass_4.txt
git clone https://github.com/kikikoteyka-dev/Kiki-Osint.git -b kiki-hub
cd Kiki-Osint
pip install Flask flask-cors pyserial
# Edit paths at the top of app.py to match your installation
python app.pyCreate keys.json next to app.py (never committed):
{
"VK_TOKEN": "vk1.a.xxx",
"GEMINI_API_KEY": "AIza...",
"ANTHROPIC_API_KEY": "sk-ant-...",
"OPENAI_API_KEY": "sk-..."
}Or set them via the Settings tab in the UI.
| Key | Where to get |
|---|---|
| VK Token | vkhost.github.io β Kate Mobile |
| Claude | console.anthropic.com |
| ChatGPT | platform.openai.com |
| Gemini | aistudio.google.com |
app.py Flask backend β hub routes + hashcat API + Flipper serial
index.html Dock UI (OSINT / WiFi / Flipper / Settings panels)
keys_store.py Read/write keys.json
wifi_cracker/
wifi_cracker.py Standalone WiFi Cracker app (also served via hub)
1. Capture with Flipper Zero + Marauder β sniffpmkid.pcap
2. Open WiFi Cracker tab β drag & drop pcap
3. Analyze β converts via WSL hcxpcapngtool
4. Run Hashcat β iterates wordlists automatically
5. Password appears in terminal when found
Connect Flipper by USB, select COM port in the Flipper tab β browse and download files directly without qFlipper.
Close qFlipper before connecting, it holds the COM port.
For educational and authorized testing purposes only.