Wifite!

The Program requires the following to run properly: The following dependencies can be installed using the _Debian package installer_ command on Debian based systems using apt-get install program or otherwise downloaded and installed manually 1 . Aircrack-NG http://www.aircrack-ng.org/
2 . Python-Scapy http://www.secdev.org/projects/scapy/

Wifite alternatives

  • Aircrack-ng

  • Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools.

    tags: cracking hacking password-recovery recover-wireless-keys
  • cSploit

  • The most complete and advanced IT security professional toolkit on Android.

    tags: Root security-and-privacy security-utilities passwords security-auditing
  • Fern Wifi Cracker

  • Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.

    tags: bruteforce cracking hacking network-scanner network-security
  • reaver

  • Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. »

    tags: network-scanner network-security network-utility bruteforce
  • Pyrit

  • Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA, OpenCL and VIA Padlock, it is currently by far the most powerful attack against one of the world’s most used security-protocols.

    tags: cracking cuda gpu hacking opencl