All Projects → soxrok2212 → Pskracker

soxrok2212 / Pskracker

Licence: gpl-3.0
An all-in-one WPA/WPS toolkit

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Pskracker

Violent Python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 603 (+159.91%)
Mutual labels:  network-security
Train Ai With Django Swagger Jwt
Train AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Stars: ✭ 66 (-71.55%)
Mutual labels:  network-security
Ivre
Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+904.74%)
Mutual labels:  network-security
Jackhammer
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (+172.84%)
Mutual labels:  network-security
Project Tauro
A Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-77.59%)
Mutual labels:  network-security
Netsec Ps Scripts
Collection of PowerShell network security scripts for system administrators.
Stars: ✭ 139 (-40.09%)
Mutual labels:  network-security
Amass
In-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+2608.62%)
Mutual labels:  network-security
Zbang
zBang is a risk assessment tool that detects potential privileged account threats
Stars: ✭ 224 (-3.45%)
Mutual labels:  network-security
Blackhat Python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+384.91%)
Mutual labels:  network-security
3proxy
3proxy - tiny free proxy server
Stars: ✭ 2,263 (+875.43%)
Mutual labels:  network-security
Anubis
🔓Subdomain enumeration and information gathering tool
Stars: ✭ 722 (+211.21%)
Mutual labels:  network-security
Scapy
Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+2887.93%)
Mutual labels:  network-security
Netpwn
Tool made to automate tasks of pentesting.
Stars: ✭ 152 (-34.48%)
Mutual labels:  network-security
Nfstream
NFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+168.1%)
Mutual labels:  network-security
Mercury
Mercury: network metadata capture and analysis
Stars: ✭ 203 (-12.5%)
Mutual labels:  network-security
Batfish
Batfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
Stars: ✭ 592 (+155.17%)
Mutual labels:  network-security
2016lykagguvenligivesizmatestleri
Network Security Notes ☔️
Stars: ✭ 75 (-67.67%)
Mutual labels:  network-security
Rubyfu
Rubyfu, where Ruby goes evil!
Stars: ✭ 228 (-1.72%)
Mutual labels:  network-security
Onesixtyone
Fast SNMP Scanner
Stars: ✭ 218 (-6.03%)
Mutual labels:  network-security
Zxrequestblock
基于NSURLProtocol一句话实现iOS应用底层所有网络请求拦截(含网页ajax请求拦截【不支持WKWebView】)、一句话实现防抓包(使Thor,Charles,Burp等代理抓包方式全部失效,且即使开启了代理,也不影响App内部的正常请求)。包含http-dns解决方法,有效防止DNS劫持。用于分析http,https请求等
Stars: ✭ 160 (-31.03%)
Mutual labels:  network-security

Overview License: GPL v3

PSKracker is a collection of WPA/WPA2/WPS default algorithms/password generators/pingens written in C.

Requirements

C compiler

Setup

Download

git clone https://github.com/soxrok2212/pskracker

Build

cd pskracker
make

Install

sudo make install

Usage

Usage: pskracker <arguments>

Required Arguments:
	
	-t, --target	: Target model number

Optional Arguments:
	-b, --bssid	: BSSID of target
	-W, --wps	: Output possible WPS pin(s) only
	-G, --guest	: Output possible guest WPA key(s) only
	-s, --serial	: Serial number
	-f, --force	: Force full output
	-h, --help	: Display help/usage

Usage Example

pskracker -t <target> -s <serial number> -b <bssid>

  • More detailed usage examples and supported models can be found on the wiki.

Targeted Example

$ pskracker -t nvg599
  ...
  aaae7uas5wrj
  aaae7v3qrvbu
  ...
$ pskracker -t dpc3941 -b 112233445566
  PSK: 5756C3915966657704

Supported OS

PSKracker should compile on macOS, Windows (with cygwin), and any Linux system.
It has been tested on macOS High Sierra 10.13.6, Windows 10, Ubuntu 16.04, Ubuntu 18.04 and ArchLinux. Embedded systems are not supported, though may still work. PSKracker is intended to be run on true pentesting environments (Desktop/Workstation/Laptop). Some psk generators (not bruteforce) are still suitable for embedded systems, but I will not provide support due to the nature of the tool.

Some 32-bit systems (Raspberry Pi with Raspbian) do not support 128-bit integers that are currently used for the Arris NVG589 algorithm, and therefore are not supported by PSKracker at this time. You may have luck with a 64-bit OS running on a recent revision, but this has not been tested.

Acknowledgements

Thank you to rofl0r, wiire and datahead for my first C endeavors!
Thank you to AAnarchYY for research dedication and motivation.

Disclaimer

This project is intended for testing and securing your own networks or networks you have permission to audit. This is not intended to be used maliciously.

In publishing these documents and source code, I (and other developers/contributors) take no responsibility for your actions. What you do with everything in this repository, as well as any information online, is your responsibility. Use this repo wisely. In light of anything I may have failed to mention regarding laws to any country or civilized region, this does not grant the excuse to include the developers or contributors in any way in your legal statements or prosecutor. Thank you.

References

Xfinity Home Security Network Algorithm

ATT NVG589 and NVG599 Algorithm

Belkin

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].