{"id":11397,"date":"2020-09-08T19:12:14","date_gmt":"2020-09-08T13:42:14","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=11397"},"modified":"2020-09-08T19:12:14","modified_gmt":"2020-09-08T13:42:14","slug":"h4rpy","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/h4rpy\/","title":{"rendered":"H4Rpy : Automated WPA\/WPA2 PSK Attack Tool"},"content":{"rendered":"\n<p><strong>H4Rpy<\/strong> is an automated WPA\/WPA2 PSK attack tool, wrapper of <a href=\"https:\/\/github.com\/aircrack-ng\/aircrack-ng\">aircrack-ng framework<\/a>. <strong><strong>H4Rpy<\/strong><\/strong> provides clean interface for automated cracking of WPA\/WPA2 PSK networks. <\/p>\n\n\n\n<p><strong>It<\/strong> enables monitor mode on selected wireless interface, scans the wireless space for access points, tries to capture WPA\/WPA2 4-way handshake for the acess point, and starts a dictionary attack on the handshake. <\/p>\n\n\n\n<p>It is also possible to send disassociate packets to clients associated with access point.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Installation<\/strong><\/p>\n\n\n\n<p>Installation consists of cloning the repo, running a script that will install dependencies (<a href=\"https:\/\/github.com\/aircrack-ng\/aircrack-ng\">aircrack-ng framework<\/a> and <a href=\"https:\/\/code.launchpad.net\/terminator\/\">Terminator<\/a> are required in order to run <strong>h4rpy<\/strong>), and making <strong>h4rpy<\/strong> executable. Script only works with apt package manager (Debian based distributions).<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong># git clone https:\/\/github.com\/MS-WEB-BN\/h4rpy\/ <br># cd h4rpy <br># sudo bash config.sh <br># sudo chmod +x h4rpy<\/strong> <\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>To run h4rpy:<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong># sudo .\/h4rpy <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Top-left<\/strong>: Enabling monitor mode, scanning for access points (packet capturing of raw 802.11 frames);<\/li><li><strong>Top-right<\/strong>: Packet capturing on selected wireless network, capturing the WPA\/WPA2 4-way handshake;<\/li><li><strong>Bottom-left<\/strong>: Sends disassocate packets to clients which are currently associated with a selected access point;<\/li><li><strong>Bottom-right<\/strong>: Dictionary attack on the captured WPA\/WPA2 4-way handshake.<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Screenshots<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-fpJb1MKaM0w\/X1XNJyovPHI\/AAAAAAAAHe8\/7OyK7w6k76MhAnaSHHmZqlu5YLs3cv5SQCLcBGAsYHQ\/s1366\/Screenshots.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-LAjcsKvfud0\/X1XNJ402_SI\/AAAAAAAAHfA\/7cl5yPDcU_k62SIFZdcF2Wjw2ZgDVLR4ACLcBGAsYHQ\/s1366\/Screenshots-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>License<\/strong><\/p>\n\n\n\n<p>The software is free to use, modify and distribute, as long as the credit is given to the creator (<em><strong>n1x_ [MS-WEB]<\/strong><\/em>).<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Disclaimer<\/strong><\/p>\n\n\n\n<p>Any actions and\/or activities done by using <strong>h4rpy<\/strong> are solely your responsibility. The misuse of <strong>h4rpy<\/strong> can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing <strong>h4rpy<\/strong> to break the law.<\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/MS-WEB-BN\/h4rpy\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>H4Rpy is an automated WPA\/WPA2 PSK attack tool, wrapper of aircrack-ng framework. H4Rpy provides clean interface for automated cracking of WPA\/WPA2 PSK networks. It enables monitor mode on selected wireless interface, scans the wireless space for access points, tries to capture WPA\/WPA2 4-way handshake for the acess point, and starts a dictionary attack on the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16501,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png","fifu_image_alt":"H4Rpy : Automated WPA\/WPA2 PSK Attack Tool","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-11397","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>H4Rpy : Automated WPA\/WPA2 PSK Attack Tool 2020<\/title>\n<meta name=\"description\" content=\"H4Rpy is an automated WPA\/WPA2 PSK attack tool, wrapper of aircrack-ng framework. H4Rpy provides clean interface for automated cracking\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/h4rpy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"H4Rpy : Automated WPA\/WPA2 PSK Attack Tool 2020\" \/>\n<meta property=\"og:description\" content=\"H4Rpy is an automated WPA\/WPA2 PSK attack tool, wrapper of aircrack-ng framework. H4Rpy provides clean interface for automated cracking\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/h4rpy\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-08T13:42:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/h4rpy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/h4rpy\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"H4Rpy : Automated WPA\/WPA2 PSK Attack Tool\",\"datePublished\":\"2020-09-08T13:42:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/h4rpy\/\"},\"wordCount\":284,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/h4rpy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png\",\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/h4rpy\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/h4rpy\/\",\"name\":\"H4Rpy : Automated WPA\/WPA2 PSK Attack Tool 2020\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/h4rpy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/h4rpy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png\",\"datePublished\":\"2020-09-08T13:42:14+00:00\",\"description\":\"H4Rpy is an automated WPA\/WPA2 PSK attack tool, wrapper of aircrack-ng framework. H4Rpy provides clean interface for automated cracking\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/h4rpy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/h4rpy\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"H4Rpy : Automated WPA\/WPA2 PSK Attack Tool 2020","description":"H4Rpy is an automated WPA\/WPA2 PSK attack tool, wrapper of aircrack-ng framework. H4Rpy provides clean interface for automated cracking","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/h4rpy\/","og_locale":"en_US","og_type":"article","og_title":"H4Rpy : Automated WPA\/WPA2 PSK Attack Tool 2020","og_description":"H4Rpy is an automated WPA\/WPA2 PSK attack tool, wrapper of aircrack-ng framework. H4Rpy provides clean interface for automated cracking","og_url":"https:\/\/kalilinuxtutorials.com\/h4rpy\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-09-08T13:42:14+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/h4rpy\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/h4rpy\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"H4Rpy : Automated WPA\/WPA2 PSK Attack Tool","datePublished":"2020-09-08T13:42:14+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/h4rpy\/"},"wordCount":284,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/h4rpy\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png","articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/h4rpy\/","url":"https:\/\/kalilinuxtutorials.com\/h4rpy\/","name":"H4Rpy : Automated WPA\/WPA2 PSK Attack Tool 2020","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/h4rpy\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/h4rpy\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png","datePublished":"2020-09-08T13:42:14+00:00","description":"H4Rpy is an automated WPA\/WPA2 PSK attack tool, wrapper of aircrack-ng framework. H4Rpy provides clean interface for automated cracking","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/h4rpy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/h4rpy\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-YIah2yxA31E\/X1XODjVfT7I\/AAAAAAAAHfQ\/xwGZ0x_0pxc0NPUTbpOSi7cffxPVbwIfwCLcBGAsYHQ\/s728\/Screenshots%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":6941,"url":"https:\/\/kalilinuxtutorials.com\/eaphammer-targeted-evil-twin-attacks-against-wpa2-enterprise-networks\/","url_meta":{"origin":11397,"position":0},"title":"Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks","author":"R K","date":"October 18, 2019","format":false,"excerpt":"EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on providing an easy-to-use interface that can be leveraged to execute powerful wireless attacks with minimal manual\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/-uqTqJwTFyU\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":4522,"url":"https:\/\/kalilinuxtutorials.com\/pyrit-wpa-precomputed-cracker-google\/","url_meta":{"origin":11397,"position":1},"title":"Pyrit : The Famous WPA Pre-Computed Cracker, Migrated from Google","author":"R K","date":"April 9, 2019","format":false,"excerpt":"Pyrit allows you to create massive databases of pre-computed WPA\/WPA2-PSK authentication phase in a space-time-tradeoff. By using the computational power of Multi-Core CPUs and other platforms through ATI-Stream,Nvidia CUDA and OpenCL, it is currently by far the most powerful attack against one of the world's most used security-protocols. WPA\/WPA2-PSK is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1501,"url":"https:\/\/kalilinuxtutorials.com\/wifite-wireless-attack-tool\/","url_meta":{"origin":11397,"position":2},"title":"Wifite 2.1.0 &#8211; Automated Wireless Attack Tool","author":"R K","date":"June 8, 2018","format":false,"excerpt":"A complete re-write of wifite, a Python script for auditing wireless networks. Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches! What's new in Wifite 2.1.0? Less bugs Cleaner process management. Does not leave processes running in the background (the old wifite was bad about this).\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=700%2C400 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=1050%2C600 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/1.gif?resize=1400%2C800 4x"},"classes":[]},{"id":6086,"url":"https:\/\/kalilinuxtutorials.com\/wifibroot-wifi-pentest-cracking-tool\/","url_meta":{"origin":11397,"position":3},"title":"WiFiBroot : A WiFi Pentest Cracking tool for WPA\/WPA2","author":"R K","date":"August 6, 2019","format":false,"excerpt":"WiFiBroot is a WiFi-Penetest-Cracking tool for WPA\/WPA2 (Handshake, PMKID, Offline Cracking, EAPOLS, Deauthentication Attack). It is built to provide clients all-in-one facility for cracking WiFi (WPA\/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library in Python. Almost every process within is dependent somehow on scapy layers and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32901,"url":"https:\/\/kalilinuxtutorials.com\/wpa2-handshake-automation-tool\/","url_meta":{"origin":11397,"position":4},"title":"WPA2 Handshake Automation Tool &#8211; A Quick Guide","author":"Varshini","date":"May 2, 2024","format":false,"excerpt":"The\u00a0WPA2 Handshake Automation Tool\u00a0is a Python3 script designed to simplify the process of setting up and capturing WPA2 handshakes. Whether you're testing your own network security or conducting ethical hacking, this tool streamlines the steps required to capture WPA2 handshakes. Features Quick setup for making and capturing WPA2 handshakes Requires\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiqyXcRSic4q8RzgB-HkN499iuT2nv4O0fPLbE1wQ2JzjoSN1PLwRB6Pjf51U6X93ENNH_kMQYs4VqJdsKwg55KmV4Mkaf5UKRZ8qlCLi3PiEuVKclz7XpCd4-TkmlTkZj_K8-UCZdKzYEwpyK8Syew1KeGniG6-h2G_OYljT7bC8wK-vcGN4noXuBJ-LJs\/s16000\/WPA2%20Handshake%20Automation%20Tool.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiqyXcRSic4q8RzgB-HkN499iuT2nv4O0fPLbE1wQ2JzjoSN1PLwRB6Pjf51U6X93ENNH_kMQYs4VqJdsKwg55KmV4Mkaf5UKRZ8qlCLi3PiEuVKclz7XpCd4-TkmlTkZj_K8-UCZdKzYEwpyK8Syew1KeGniG6-h2G_OYljT7bC8wK-vcGN4noXuBJ-LJs\/s16000\/WPA2%20Handshake%20Automation%20Tool.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiqyXcRSic4q8RzgB-HkN499iuT2nv4O0fPLbE1wQ2JzjoSN1PLwRB6Pjf51U6X93ENNH_kMQYs4VqJdsKwg55KmV4Mkaf5UKRZ8qlCLi3PiEuVKclz7XpCd4-TkmlTkZj_K8-UCZdKzYEwpyK8Syew1KeGniG6-h2G_OYljT7bC8wK-vcGN4noXuBJ-LJs\/s16000\/WPA2%20Handshake%20Automation%20Tool.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiqyXcRSic4q8RzgB-HkN499iuT2nv4O0fPLbE1wQ2JzjoSN1PLwRB6Pjf51U6X93ENNH_kMQYs4VqJdsKwg55KmV4Mkaf5UKRZ8qlCLi3PiEuVKclz7XpCd4-TkmlTkZj_K8-UCZdKzYEwpyK8Syew1KeGniG6-h2G_OYljT7bC8wK-vcGN4noXuBJ-LJs\/s16000\/WPA2%20Handshake%20Automation%20Tool.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiqyXcRSic4q8RzgB-HkN499iuT2nv4O0fPLbE1wQ2JzjoSN1PLwRB6Pjf51U6X93ENNH_kMQYs4VqJdsKwg55KmV4Mkaf5UKRZ8qlCLi3PiEuVKclz7XpCd4-TkmlTkZj_K8-UCZdKzYEwpyK8Syew1KeGniG6-h2G_OYljT7bC8wK-vcGN4noXuBJ-LJs\/s16000\/WPA2%20Handshake%20Automation%20Tool.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiqyXcRSic4q8RzgB-HkN499iuT2nv4O0fPLbE1wQ2JzjoSN1PLwRB6Pjf51U6X93ENNH_kMQYs4VqJdsKwg55KmV4Mkaf5UKRZ8qlCLi3PiEuVKclz7XpCd4-TkmlTkZj_K8-UCZdKzYEwpyK8Syew1KeGniG6-h2G_OYljT7bC8wK-vcGN4noXuBJ-LJs\/s16000\/WPA2%20Handshake%20Automation%20Tool.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2144,"url":"https:\/\/kalilinuxtutorials.com\/fluxion\/","url_meta":{"origin":11397,"position":5},"title":"Fluxion &#8211; Remake Of Linset By VK496 With Less Bugs &#038; Enhanced Functionality","author":"R K","date":"August 5, 2018","format":false,"excerpt":"Fluxion is the future of MITM WPA attacks. Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA\/WPA2 key from a target access point by means of a social\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"https:\/\/github.com\/Nekmo\/dirhunt","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=11397"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11397\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16501"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=11397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=11397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=11397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}