SECURITY AUTOMATION BASH
Automating Offensive Security Workflows with VOIDWAVE
2026-01-05 8 min read
Automating Offensive Security Workflows
In the world of penetration testing, speed and efficiency are paramount. Manually running tool after tool, configuring interfaces, and managing output files can be a massive time sink. This is why I built VOIDWAVE.
The Problem
Standard pentesting workflows often involve:
- Manually putting wireless cards into monitor mode.
- Running
airodump-ngto find targets. - Copying BSSIDs and channels.
- Running specific attacks like deauth or handshake capture.
This context switching breaks flow and introduces human error.
The Solution: VOIDWAVE
VOIDWAVE is designed to be a "set it and forget it" framework for the initial stages of an engagement.
Key Features
- Auto-Detection: It automatically finds your wireless interfaces and puts them in the correct mode.
- Intelligent Targeting: It scans the environment and presents a list of viable targets.
- Unified Output: All data is saved in a structured format for reporting.
bash
# Example usage
sudo voidwave --target auto --attack deauth
# Example usage
sudo voidwave --target auto --attack deauth
Conclusion
Automation doesn't replace the pentester; it frees them to focus on the complex, creative parts of the job.