H4rpy is an automated WPA/WPA2 PSK attack tool, wrapper of aircrack-ng framework.
H4rpy is a tool that facilitates automated cracking of WPA/WPA2 PSK networks through a user-friendly interface. It activates monitor mode on a designated wireless interface, searches for available access points in the wireless space, captures the WPA/WPA2 4-way handshake of the access point, and initiates a dictionary attack on the captured handshake. In addition, h4rpy can send disassociate packets to clients who are connected to the access point.
Installation:
Installation consists of cloning the repo, running a script that will install dependencies (aircrack-ng framework and Terminator are required in order to run h4rpy), or installing them manually, and making h4rpy executable. Installation script works with apt and pacman package managers (Debian and Arch).
1
git clone https://github.com/MS-WEB-BN/h4rpy/
1
cd h4rpy
1
sudo bash config.sh
1
sudo chmod +x h4rpy
Usage:
To run h4rpy:
1
sudo ./h4rpy
Top-left: Enabling monitor mode, scanning for access points (packet capturing of raw 802.11 frames);
Top-right: Packet capturing on selected wireless network, capturing the WPA/WPA2 4-way handshake;
Bottom-left: Sends disassocate packets to clients which are currently associated with a selected access point;
Bottom-right: Dictionary attack on the captured WPA/WPA2 4-way handshake.
Screenshots:
License:
The software is free to use, modify and distribute, as long as the credit is given to the creator (n1x_ [MS-WEB]).
⚠ ONLY USE FOR EDUCATIONAL PURPOSES ⚠