Useful tools for cracking/processing WPA-PBKDF2-PMKID+EAPOL hashes and passwords. Written in C, python, bash.
hcx-info <hashes.txt> # display a nice table for hashes dumped from hcxpcapngtool
# (MACs, BSSIDs, ESSIDs, passwords, vendor info, ...)
# fetches passwords from hashcat if any cracked hashes detected,
# display vendor info with -v for all macs...
hcx-cracker <hashes.txt> # crack wifi passwords by using their essids
hcx-potfile # display a nice table for all hashcat passwords in potfilehcx-info <hashes.txt># TYPE HASH MAC AP MAC CLIENT ESSID PASSWORD
- ----- ------...------ ------------ ------------ ---------------- -----------
1 EAPOL 195bf3...fb1ec7 4c72b90f32c6 f04f7cb94dfd MyFast-Wifi test1234 ...
2 PMKID d74192...6c0580 78f29ef71570 b8e4dfd8c840 Galaxy Internet testing123 ...
...
hcx-cracker <hashes.txt> -ab # generates gen and run scripts
./gen.sh # generates wordlists by network ESSID for each network
./run.sh # runs hashcat with generated wordlistshcx-rpidump # small script that starts hcxdumptool when wlan1
# device is connected to raspberry pi
hcx-rpidump-install # make systemd service and start it
hcx-rpidump-filtergen <BSSID> # filter your own network from attack
hcx-rpidump-wmenu # rasberry pi waveshare menu for starting hcxdumptool
hcx-status # print current unique hashes (by bssid) in cwdUse the newer version: hcx-fastgenlst
hcx-genlst # name + numer, number + name, number + name + number
hcx-genlst-num8 # numbers from 00000000 to 99999999
hcx-genlst-numcommon # common numbers (dates, etc.)
hcx-genlst-upper8 # generate upper ascii with length 8hcx-genlst -lut123 -s steve
# will generate a wordlist that has passwords like: steve66, 123Steve, 69STEVE69, ...
# -l -- lower word variation
# -u -- UPPER word variation
# -t -- Title word variation
# -1 -- word + int
# -2 -- int + word
# -3 -- int + word + int
# ..... use -h to show other options...hcx-wifi # airodump-ng clone written in python that shows you passwords of
# nearby networks you have cracked with hashcat
hcx-wifi-genpasslst # generate password csv list for hcx-wifi or hcx-awifiAlso check out: hcx-awifi (android app hcx-wifi)
hcx-wifi-genpasslst <hashes.txt> > <passlst.csv>
hcx-wifi wlan1mon <passlst.csv>CH 4 | 2024-09-07 22:46:13.812907 | COUNT: 21 | PASS: 10 (3) | SORT BY: β PWR
> RESUMED CHANNEL HOPPER
BSSID ESSID PASSWORD PWR LAST SEEN # CH
----------------- ---------------- ---------- ----- ------------------- --- ----
48:8E:EF:E6:55:22 My Home Network password1 -37 2024-09-07 22:46:13 6 1 ...
96:9A:4A:7E:7E:7E Network Test 1 123456789 -51 2024-09-07 22:46:13 18 4 ...
90:9A:4A:97:77:66 Super Fast AP ... -63 2024-09-07 22:46:13 20 4 ...
...
First install this tool: abgl
hcx-abgl <hashes.txt> | tee <out.txt> # get bssid locations in bulk from Apple's
# servers and output to stdout & out.txt fileUse the leaflet_bulk_geolocator.html from abgl to show out.txt locations on a map.
Create a maindb.txt file that stores the full path of your file that contains all your hashes.
hcx-cap # extract info from newly captured cap/pcapng files
hcx-new # get newly captured hashes that are not in main hashes db
hcx-fetch # grep hcx-info for main hashes db- bash
- gcc
- make
- python (pip: psutil colorama tabulate scapy getkey)
- hashcat
- hcxtools
- hcxdumptool
- hcx-fastgenlst
./build.sh
./install.shThis will just ln -sfr <tools> /usr/local/bin/., some tools depend on each other...
The hcx-tools-extra are intended for educational purposes only. The author is not responsible or liable for any misuse, illegal activity, or damage caused by the use of these scripts. Users are solely responsible for ensuring compliance with applicable laws and regulations.