Alternatives to Wifite for Linux, Windows, Mac, Android, Android Tablet and more. Filter by license to discover only free or Open Source alternatives. This list contains a total of 5 apps similar to Wifite.
To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. If your looking for more info about Wifite like screenshots, reviews and comments you should visit our info page about it. Below you find the best alternatives.
The list of alternatives was last updated: 11/19/2015 5:45:00 AM
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.
The most complete and advanced IT security professional toolkit on Android. - enumerate local hostsdone - find vulnerabilitiesdone - find exploits for these vulnerabilitiesdone - use those exploits to gain access to the targetdone - crack wifi passwords - install backdoors for later access - Portability: It can run on any UNIX-based system, but for now only Android is supported.
Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks. To unlock pro features: http://fern-pro.com/purchase
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP.
Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA, OpenCL and VIA Padlock, it is currently by far the most powerful attack against one of the world’s most used security-protocols.
Pyrit uses information usually gathered by Wifite. While they are similar in function and purpose, their features are truly different
Guest • Jan 2016Disagree Agree