▓█████▄ ▓█████ ▄▄▄ █ ██ ▄▄▄█████▓ ██░ ██ ▒██▀ ██▌▓█ ▀▒████▄ ██ ▓██▒▓ ██▒ ▓▒▓██░ ██▒ ░██ █▌▒███ ▒██ ▀█▄ ▓██ ▒██░▒ ▓██░ ▒░▒██▀▀██░ ░▓█▄ ▌▒▓█ ▄░██▄▄▄▄██ ▓▓█ ░██░░ ▓██▓ ░ ░▓█ ░██ ░▒████▓ ░▒████▒▓█ ▓██▒▒▒█████▓ ▒██▒ ░ ░▓█▒░██▓ ▒▒▓ ▒ ░░ ▒░ ░▒▒ ▓▒█░░▒▓▒ ▒ ▒ ▒ ░░ ▒ ░░▒░▒ ░ ▒ ▒ ░ ░ ░ ▒ ▒▒ ░░░▒░ ░ ░ ░ ▒ ░▒░ ░ ░ ░ ░ ░ ░ ▒ ░░░ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ▄▄▄ ▄▄▄█████▓▄▄▄█████▓ ▄▄▄ ▄████▄ ██ ▄█▀ ▒████▄ ▓ ██▒ ▓▒▓ ██▒ ▓▒▒████▄ ▒██▀ ▀█ ██▄█▒ ▒██ ▀█▄ ▒ ▓██░ ▒░▒ ▓██░ ▒░▒██ ▀█▄ ▒▓█ ▄ ▓███▄░ ░██▄▄▄▄██░ ▓██▓ ░ ░ ▓██▓ ░ ░██▄▄▄▄██ ▒▓▓▄ ▄██▒▓██ █▄ ▓█ ▓██▒ ▒██▒ ░ ▒██▒ ░ ▓█ ▓██▒▒ ▓███▀ ░▒██▒ █▄ ▒▒ ▓▒█░ ▒ ░░ ▒ ░░ ▒▒ ▓▒█░░ ░▒ ▒ ░▒ ▒▒ ▓▒ ▒ ▒▒ ░ ░ ░ ▒ ▒▒ ░ ░ ▒ ░ ░▒ ▒░ ░ ▒ ░ ░ ░ ▒ ░ ░ ░░ ░ ░ ░ ░ ░░ ░ ░ ░ ░
A simple and automatized tool for deauthication attacks