Since WPA3 uses Management Frame Protection, tools like aircrack-ng don’t work well for attacks like deauth or handshake capture.
Instead, this tool sets up a MITM using arpspoof, then disables IP forwarding to cause infinite buffering on the victim’s device. They appear connected to Wi-Fi, but get no usable internet. It’s a “quiet” denial of service.
Tested it on Windows 10/11 and iPads (works), Xiaomi phones (resist it using ARP table hardening).
Here’s the GitHub repo: github.com/yourusername/nethole
I'd love feedback on whether this approach is already documented or if it might be useful for further exploration into WPA3 behavior.