The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Find a file
2024-08-18 13:43:43 +02:00
.github chore: added github to funding 2024-08-17 12:44:39 +02:00
caplets new: new -caplets-path argument to specify an alternative caplets base path (closes #850) 2021-03-23 19:05:58 +01:00
core releasing version 2.33.0 2024-08-09 11:25:32 +02:00
firewall fix: using proper v2 package suffix (fixes #727) 2024-08-09 18:19:21 +02:00
js fix: using proper v2 package suffix (fixes #727) 2024-08-09 18:19:21 +02:00
log fix: using proper v2 package suffix (fixes #727) 2024-08-09 18:19:21 +02:00
modules fix: make sure that wifi channels are unique and sorted 2024-08-17 13:37:48 +02:00
network fix: do not attempt mac lookup if gateway is empty 2024-08-18 13:43:43 +02:00
packets fix: WPA3 is now correcly identified and reported (fixes #1098) 2024-08-17 12:40:40 +02:00
routing fix: using proper v2 package suffix (fixes #727) 2024-08-09 18:19:21 +02:00
session fix: do not report a routing error if the interface is disconnected 2024-08-18 13:43:19 +02:00
tls fix: using proper v2 package suffix (fixes #727) 2024-08-09 18:19:21 +02:00
.gitignore fix: added cover.out to .gitignore 2024-08-08 16:44:10 +02:00
bettercap.service fix: fixed bettercap.service file to use the api.rest from the eval argument instead as an autostarted module 2018-09-27 16:56:01 +02:00
Dockerfile fix: fixed docker build 2024-08-09 11:14:36 +02:00
go.mod new: implemented can.filter 2024-08-17 11:38:58 +02:00
go.sum new: implemented can.filter 2024-08-17 11:38:58 +02:00
ISSUE_TEMPLATE.md misc: small fix or general refactoring i did not bother commenting 2019-03-09 16:24:56 +01:00
LICENSE.md Changing http links to https when possible 2018-02-21 21:42:19 +01:00
main.go fix: using proper v2 package suffix (fixes #727) 2024-08-09 18:19:21 +02:00
Makefile Add DESTDIR variable 2021-08-08 00:19:47 -04:00
openwrt.makefile misc: added openwrt makefile by DeathCamel58 for reference 2021-01-09 00:19:41 +01:00
README.md chore: added WPA3 to readme 2024-08-17 13:14:08 +02:00
release.py new: using simpler release file 2024-08-09 11:22:08 +02:00
SECURITY.md misc: small fix or general refactoring i did not bother commenting 2021-03-14 15:42:09 +01:00

Join the project community on our server!


BetterCap

Release Software License Tests on Linux Tests on macOS Tests on Windows Docker Hub

bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, CAN-bus, wireless HID devices and Ethernet networks.

UI

Main Features

  • WiFi networks scanning, deauthentication attack, clientless PMKID association attack and automatic WPA/WPA2/WPA3 client handshakes capture.
  • Bluetooth Low Energy devices scanning, characteristics enumeration, reading and writing.
  • 2.4Ghz wireless devices scanning and MouseJacking attacks with over-the-air HID frames injection (with DuckyScript support).
  • CAN-bus and DBC support for decoding, injecting and fuzzing frames.
  • Passive and active IP network hosts probing and recon.
  • ARP, DNS, NDP and DHCPv6 spoofers for MITM attacks on IPv4 and IPv6 based networks.
  • Proxies at packet level, TCP level and HTTP/HTTPS application level fully scriptable with easy to implement javascript plugins.
  • A powerful network sniffer for credentials harvesting which can also be used as a network protocol fuzzer.
  • A very fast port scanner.
  • A powerful REST API with support for asynchronous events notification on websocket to orchestrate your attacks easily.
  • A very convenient web UI.
  • More!

License

bettercap is made with ♥ by the dev team and it's released under the GPL 3 license.

Stargazers over time

Stargazers over time