There are 7 repositories under wpa topic.
Wordlist, rules and masks from Kaonashi project (RootedCON 2019)
A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mode for stress testing
An all-in-one WPA/WPS toolkit
Wifi Cracking
种群算法复现(swarm-algorithm),包括乌鸦搜索(Crow Search Algorithm, CSA)、樽海鞘群算法(Salp Swarm Algorithm, SSA)、缎蓝园丁鸟优化算法(Satin Bowerbird Optimizer, SBO)、麻雀搜索算法(Sparrow Search Algorithm, SSA)、 狼群搜索算法(2007WPS, 2013WPA)、正余弦优化算法(Sine Cosine Algorithm, CSA)、烟花算法(Fireworks Algorithm, FA)
Hack wifi using termux (rooted).
Wireless tools for Node.js
Pwnagotchi plugin to display the most recently cracked password on the Pwnagotchi face
Linset is a WPA/WPA2 phishing tool (evil twin)
GUI - Analyze WPA/WPA2 handshakes from FlipperZero's captured .pcaps to find out the WiFi Passwords.
Automated Wi-Fi cracker for macOS
Used to crack Wifi passwords (Current size: 2GB / Total number of passwords: 340 million)
Tutorial para quebrar senhas de redes Wifi WPA/WPA2, utilizando o método de força bruta.
the best and small passwords lists to crack handshake wpa-wpa2
Pwnagotchi plugin to intelligently associate with wireless networks
Tool used to Convert a cap/pcap/pcapng capture file to a hashcat hcwpax/hccapx/hccap/hcpmkid/hceapmd5/hceapleap file
This Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16 Numbers in length. So it could get a bit large.
Hashcat WPA/WPA2 server
Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Tổng hợp danh sách mật khẩu wifi tiếng Việt sử dụng cho aircrack-ng
A guide to using the Aircrack-ng suite for cracking 802.11 WEP and WPA/WPA2-PSK keys, including techniques like packet sniffing and injection attacks to test Wi-Fi network security.
Dashboard RAD with Quasar - use todo o poder do Quasar de forma rápida e versátil
The WiFi Penetration Toolkit
crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.