KickThemOut v2.0! 🎉

KickThemOut v2.0 is finally here, along with major fixes and modifications!

Major new changes:

Python 3 compatibility (yay)

Following several requests and recommendations from the community, KickThemOut has officially shifted to compatibility with Python 3! 🎊

Here's what the new Debian installation looks like:

~ ❯❯❯ sudo apt-get update && sudo apt-get install nmap
~ ❯❯❯ git clone
~ ❯❯❯ cd kickthemout/
~/kickthemout ❯❯❯ sudo -H pip3 install -r requirements.txt
~/kickthemout ❯❯❯ sudo python3

For installation instructions on Arch and macOS devices, refer to the repository's readme page.

Non-interactive attack (using optparser)

KickThemOut can now be run using terminal arguments, meaning that users are not required to go through the interactive selection process anymore.

Here are v2.0's usage arguments:

Usage: sudo python3 [options]

  --version             show program's version number and exit
  -h, --help            show this help message and exit
  -p PACKETS, --packets=PACKETS
                        number of packets broadcasted per minute (default: 6)
  -s, --scan            perform a quick network scan and exit
  -t TARGETS, --target=TARGETS
                        specify target IP address(es) and perform attack

  sudo python3 --target 
  sudo python3 -t, -p 30
  sudo python3 -s
  sudo python3 (interactive mode)

To view all available options from your terminal run:

~/kickthemout ❯❯❯ sudo python3 -h

In addition, users can now avoid the full network scan that occurs when running KickThemOut interactively (i.e. ~ ❯❯❯ sudo python3 and can immediately initiate an attack using short and simple commands such as:

~/kickthemout ❯❯❯ sudo python3 -t {TARGET_IP} -p {#_OF_PACKETS/MIN}

An example of a non-interactive attack:


The image above displays KickThemOut's network scanning argument for fast active host discovery. As you can see, each device's host name is also shown (shoutout to R3DDY for his commits).


In this example, KickThemOut is broadcasting 60 packets per minute (i.e. 1 packet/sec), kicking out the host with IP address, using the non-interactive attack method.

Finally, I would like to thank you all for your inspiring messages and great support. If you haven't done so already, do check out our GitHub repository here and make sure to follow David and myself for upcoming updates on this project and on many more to come.