01Step-by-step WPA2/WPA3 handshake capture and GPU-accelerated cracking procedures
02Detailed configurations for Rogue AP and Evil Twin attack simulations
034,121 GitHub stars
04Automated workflows for 802.11 reconnaissance and passive network scanning
05WPA2-Enterprise (EAP) credential harvesting and MSCHAPv2 analysis
06Comprehensive vulnerability templates for reporting findings like weak WPS or lack of client isolation