The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Find a file
2021-03-23 19:05:58 +01:00
.github Create FUNDING.yml 2019-10-09 16:04:03 +02:00
builder change qemu url 2021-03-14 20:25:47 +00:00
caplets new: new -caplets-path argument to specify an alternative caplets base path (closes #850) 2021-03-23 19:05:58 +01:00
core new: new -caplets-path argument to specify an alternative caplets base path (closes #850) 2021-03-23 19:05:58 +01:00
firewall misc: small fix or general refactoring i did not bother commenting 2019-03-30 18:19:34 +01:00
log refact: refactored to use islazy and updated deps 2018-10-10 19:00:25 +02:00
modules fix: fixed compilation issue on windows 2021-03-14 21:47:22 +01:00
network fix: updated OUI list (closes #833) 2021-03-14 16:06:16 +01:00
packets Update broken tests 2019-06-30 22:22:36 +02:00
session new: new -caplets-path argument to specify an alternative caplets base path (closes #850) 2021-03-23 19:05:58 +01:00
tls tls: fix CertConfigFromModule() return order 2019-11-13 14:31:55 -08:00
.gitignore misc: added .idea to .gitignore 2019-09-26 13:58:31 +02:00
.travis.yml change qemu url 2021-03-14 20:25:47 +00:00
bettercap.service fix: fixed bettercap.service file to use the api.rest from the eval argument instead as an autostarted module 2018-09-27 16:56:01 +02:00
build.sh new: updated build script to generate a linux/armv6l image (rpi0w+raspbian) 2019-10-04 20:43:40 +02:00
Dockerfile Dockerfile: Use go modules instead of third party dependency tool (fe7e103387) 2019-11-06 22:02:45 +01:00
go.mod fix: updated readline, using syscall package instead of constants (fixes #776) 2021-02-28 16:18:32 +01:00
go.sum fix: updated readline, using syscall package instead of constants (fixes #776) 2021-02-28 16:18:32 +01:00
ISSUE_TEMPLATE.md misc: small fix or general refactoring i did not bother commenting 2019-03-09 16:24:56 +01:00
LICENSE.md Changing http links to https when possible 2018-02-21 21:42:19 +01:00
main.go new: new -version command line argument to print version, build information and exit 2019-03-09 16:22:35 +01:00
Makefile misc: small fix or general refactoring i did not bother commenting 2019-10-18 15:27:49 +02:00
openwrt.makefile misc: added openwrt makefile by DeathCamel58 for reference 2021-01-09 00:19:41 +01:00
README.md misc: removed useless badges from the README 2020-09-25 16:52:36 +02:00
release.stork misc: added git:changelog to release script 2021-03-14 16:07:50 +01:00
SECURITY.md misc: small fix or general refactoring i did not bother commenting 2021-03-14 15:42:09 +01:00

BetterCap

Release Software License Travis

bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.

UI

Main Features

  • WiFi networks scanning, deauthentication attack, clientless PMKID association attack and automatic WPA/WPA2 client handshakes capture.
  • Bluetooth Low Energy devices scanning, characteristics enumeration, reading and writing.
  • 2.4Ghz wireless devices scanning and MouseJacking attacks with over-the-air HID frames injection (with DuckyScript support).
  • Passive and active IP network hosts probing and recon.
  • ARP, DNS and DHCPv6 spoofers for MITM attacks on IP based networks.
  • Proxies at packet level, TCP level and HTTP/HTTPS application level fully scriptable with easy to implement javascript plugins.
  • A powerful network sniffer for credentials harvesting which can also be used as a network protocol fuzzer.
  • A very fast port scanner.
  • A powerful REST API with support for asynchronous events notification on websocket to orchestrate your attacks easily.
  • A very convenient web UI.
  • More!

About the 1.x Legacy Version

While the first version (up to 1.6.2) of bettercap was implemented in Ruby and only offered basic MITM, sniffing and proxying capabilities, the 2.x is a complete reimplementation using the Go programming language.

This ground-up rewrite offered several advantages:

  • bettercap can now be distributed as a single binary with very few dependencies, for basically any OS and any architecture.
  • 1.x proxies, although highly optimized and event based, used to bottleneck the entire network when performing a MITM attack, while the new version adds almost no overhead.
  • Due to such performance and functional limitations, most of the features that the 2.x version is offering were simply impossible to implement properly (read as: without killing the entire network ... or your computer).

For this reason, any version prior to 2.x is considered deprecated and any type of support has been dropped in favor of the new implementation. An archived copy of the legacy documentation is available here, however it is strongly suggested to upgrade.

Documentation and Examples

The project is documented here.

License

bettercap is made with ♥ by the dev team and it's released under the GPL 3 license.

Stargazers over time

Stargazers over time