Wifi-Cracker

A robust network security auditing tool designed for penetration testers to evaluate wireless network resilience.

Professional Auditing

Wifi-Cracker provides a comprehensive suite for wireless vulnerability research. It automates common tasks like handshake capture, de-authentication attacks, and wordlist processing, allowing security professionals to focus on the results.

Ethical Use Only

This tool is intended for legal security research and authorized penetration testing only. Use on networks without permission is strictly prohibited.

  • WPA/WPA2-PSK handshake capture with auto-deauth
  • GPU-accelerated cracking support for massive wordlists
  • Custom PMKID attack logic for clientless cracking
  • Advanced signal filtering and BSSID isolation
wifi-cracker --scan

[INIT] Monitoring wlan0mon... [OK]

BSSID PWR CH ESSID
E4:A7:C5:x.x -38dB 11 SecureDev_AP

[ACTION] Sending De-auth packets to Clients...

[WAIT] Listening for 4-way handshake...

[SUCCESS] WPA Handshake Captured! (Size: 22KB)

[CRACK] Starting GPU hybrid attack... [35% complete]

GPU Offloading

Supports OpenCL and CUDA to offload heavy SHA-256 computations to local graphics hardware.

Rule-Based Attack

Define complex password mutation rules (Capitalization, Symbols, Years) to enhance dictionary hits.

Packet Injection

Verified injection test ensures your hardware is fully capable of de-authentication before starting.

Breach Analysis Modules

MDK4 Integration

Integrated MDK4 logic for advanced beacon flooding and client-specific de-authentication during high-density audits.

PMKID Clientless Capture

Utilizes newer RSN IE features to capture hashes directly from the AP without needing any clients to be active or re-authing.

Hybrid Wordlist Engine

Combine static dictionaries with real-time mask generation to cover billions of variations in minutes using multi-threading.

Technical Specs

Standard Support WPA/WPA2/WPA3 (Enterprise & Personal)
Cracking Core Hashcat/Aircrack-ng Wrapped Engine
Acceleration OpenCL / CUDA 11+ Ready
Capture Formats .PCAP, .CAP, .HCCAPX, .PMKID
Hardware Req Monitor Mode & Injection Capable Chipsets

The Auditing Workflow

01

Survey

Passive scan of the RF environment to identify BSSIDs and signal strength.

02

Target

PMKID / Handshake

Execute de-authentication or PMKID capture request against specific targets.

03

Compute

Run the captured hashes against the high-performance GPU cracking engine.

04

Decrypt

Verify credentials and provide detailed vulnerability remediation report.

Secure Your Network

Download on GitHub