Useful python scripts for cracking/processing WPA-PBKDF2-PMKID+EAPOL hashes and passwords.
- python
- hashcat
- hcxtools
- hcxdumptool
- hcx-fastgenlst
- colorama
- tabulate
- scapy
- getkey
./install.sh
This will just ln -sfr <scripts> /usr/local/bin/.
, some scripts depend on each other...
hcx-info hashes.txt - display a nice table for hashes in file
(MACs, BSSIDs, ESSIDs, passwords, vendor info, ...)
fetches passwords from hashcat if any cracked hashes detected,
display vendor info with -v for all macs...
hcx-cracker hashes.txt - crack wifi passwords by using their essids
hcx-potfile - display a nice table for all hashcat passwords in potfile
./hcx-info hashes.txt
# TYPE HASH MAC AP MAC CLIENT ESSID PASSWORD
- ----- ------...------ ------------ ------------ ---------------- -----------
1 EAPOL 195bf3...fb1ec7 4c72b90f32c6 f04f7cb94dfd MyFast-Wifi test1234 ...
2 PMKID d74192...6c0580 78f29ef71570 b8e4dfd8c840 Galaxy Internet testing123 ...
...
./hcx-cracker hashes.txt -ab # generates gen and run scripts
./gen.sh # generates wordlists by network ESSID for each network
./run.sh # runs hashcat with generated wordlists
hcx-rpidump - small script that starts hcxdumptool when wlan1
device is connected to raspberry pi
hcx-rpidump-wmenu - rasberry pi waveshare menu for starting hcxdumptool
Use the newer version: hcx-fastgenlst
hcx-genlst - name + numer, number + name, number + name + number
hcx-genlst-num8 - numbers from 00000000 to 99999999
hcx-genlst-numcommon - common numbers (dates, etc.)
hcx-genlst-upper8 - generate upper ascii with length 8
hcx-genlst -lut123 -s steve
# will generate a wordlist that has passwords like: steve66, 123Steve, 69STEVE69, ...
# -l -- lower word variation
# -u -- UPPER word variation
# -t -- Title word variation
# -1 -- word + int
# -2 -- int + word
# -3 -- int + word + int
# ..... use -h to show other options...
hcx-wifi - airodump-ng clone written in python that shows you passwords of
nearby networks you have cracked with hashcat
hcx-wifi-genpasslst - generate password csv list for hcx-wifi
./hcx-wifi-genpasslst hashes.txt > passlst.csv
./hcx-wifi wlan1mon passlst.csv
CH 4 | 2024-09-07 22:46:13.812907 | COUNT: 21 | PASS: 10 (3) | SORT BY: ↓ PWR
> RESUMED CHANNEL HOPPER
BSSID ESSID PASSWORD PWR LAST SEEN # CH
----------------- ---------------- ---------- ----- ------------------- --- ----
48:8E:EF:E6:55:22 My Home Network password1 -37 2024-09-07 22:46:13 6 1 ...
96:9A:4A:7E:7E:7E Network Test 1 123456789 -51 2024-09-07 22:46:13 18 4 ...
90:9A:4A:97:77:66 Super Fast AP ... -63 2024-09-07 22:46:13 20 4 ...
...
hcx-cap - extract info from newly captured cap/pcapng files
hcx-new - get newly captured hashes that are not in main hashes db
hcx-fetch - grep hcx-info for main hashes db
The hcx-scripts are intended for educational purposes only. The author is not responsible or liable for any misuse, illegal activity, or damage caused by the use of these scripts. Users are solely responsible for ensuring compliance with applicable laws and regulations.