{"id":13615998,"url":"https://github.com/ExtremePro11299/batch_wifi_brute_forcer","last_synced_at":"2025-04-14T00:31:29.445Z","repository":{"id":170401841,"uuid":"646532801","full_name":"ExtremePro11299/batch_wifi_brute_forcer","owner":"ExtremePro11299","description":"A Wifi password cracker using internal CMD commands.","archived":false,"fork":true,"pushed_at":"2024-07-01T11:18:08.000Z","size":80,"stargazers_count":5,"open_issues_count":0,"forks_count":3,"subscribers_count":0,"default_branch":"main","last_synced_at":"2024-08-02T20:47:42.901Z","etag":null,"topics":["batch","batch-app","batchfile","brute-force","bruteforce","bruteforcer","cmd","wifi","wifi-brute-force","wifi-bruteforce","wifi-hacking","wifi-password","windows"],"latest_commit_sha":null,"homepage":"","language":"Batchfile","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":"TechnicalUserX/batch_wifi_brute_forcer","license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ExtremePro11299.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2023-05-28T17:43:10.000Z","updated_at":"2024-07-09T21:10:46.000Z","dependencies_parsed_at":"2023-10-14T16:38:40.844Z","dependency_job_id":null,"html_url":"https://github.com/ExtremePro11299/batch_wifi_brute_forcer","commit_stats":null,"previous_names":["extremepro11299/batch_wifi_brute_forcer"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ExtremePro11299%2Fbatch_wifi_brute_forcer","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ExtremePro11299%2Fbatch_wifi_brute_forcer/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ExtremePro11299%2Fbatch_wifi_brute_forcer/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ExtremePro11299%2Fbatch_wifi_brute_forcer/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ExtremePro11299","download_url":"https://codeload.github.com/ExtremePro11299/batch_wifi_brute_forcer/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":223611634,"owners_count":17173479,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["batch","batch-app","batchfile","brute-force","bruteforce","bruteforcer","cmd","wifi","wifi-brute-force","wifi-bruteforce","wifi-hacking","wifi-password","windows"],"created_at":"2024-08-01T20:01:22.001Z","updated_at":"2025-04-14T00:31:29.439Z","avatar_url":"https://github.com/ExtremePro11299.png","language":"Batchfile","readme":"# Batch Wi-Fi Brute Forcer\nAn active attack tool against Wi-Fi networks with internal CMD commands.\n\nThis program is created to be a proof of concept that it is possible\nto write a working Wi-Fi attack tool with Batchfiles since there \nare countless examples on the internet that claims to be legit\nhacking tools, working on CMD. While this tool does not claim\na 100% success ratio, it still works if the target Wi-Fi has\nweak password. :)\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://github.com/user-attachments/assets/caf3dc1f-4504-480d-b375-4dd437f5a09b\" width=\"80%\" /\u003e\n\u003c/p\u003e\n\n\n## Usage\n\n### Interface initialization\nThe program automatically detects your wireless interfaces when you execute the batch file.\nIf it finds only one, it will select it as default. If there are multiple interfaces,\nthe program will ask you to choose one. If none exist, it will stay \"not_defined\".\n\n\u003e You can later change the interface by typing `interface` on the main menu.\n\u003e This will bring the interface initialization screen back.\n\n### Scan\nWhen you type `scan` at the main menu, the program will enumerate all Wi-Fi networks\navailable from the selected wireless interface. You can choose one by typing the number\nassociated with an SSID.\n\n\u003e No Name could mean that the network is hidden. You cannot attack that network.\n\n\u003e Performing a scan disconnects the interface from the network that it has connected previously.\n\n### Selecting a wordlist\nA wordlist file is already provided in the repository. If you want to use a custom\nwordlist, you have to specify the file you are going to use by typing `wordlist` on the \nmain menu and then typing the absolute or relative path of the wordlist file.\n\n### Attacking\nSimply type `attack` and the program will show you a warning screen that this process is going\nto delete the profile associated with the SSID if you have connected to it before.\nIt means you will lose the password you entered while connecting to that SSID before.\nSave it before using the attack.\n\n### Counter\nWhen a connection is attempted with `netsh` to a network, it takes time to establish the connection. To check whether the connection is successful,\nthe program repeatedly queries the connection status of the selected interface. A counter value controls how many times this query will be done.\nIf not changed, the counter value is 10, and counts down after each query for each password combination. \n\n\u003e If an authentication or association is detected, this value is increased by 5 to ensure a successful connection.\n\n## Limitations\n- This program has been tested unsuccessfully on Windows 7 and tested successfully on Windows 10 and 11. Since some commands may differ in terms of output between Windows versions, it is not expected to work on previous versions.\n\n- ANSI escape sequences used in the terminal were added to the Windows Console in the Windows 10 version 1511, previous versions are not expected to run this program.\n\n- There is a strict dependency on the command line utility `netsh`, meaning that it cannot understand \"Unicode\" characters. Only ASCII characters are supported for network names.\n\n- The command line utilities cannot be forced to output English-only text, which means parsing particularly depends on English-based output from command line utilities. Any other system language is not expected to be compatible with this program.\n\n- Speed is significantly slow due to its nature.\n\n- Cannot attack hidden networks.\n\n## Result file\nIf an attack is successful, the result is automatically written to `result.txt`.\n\n\n## Help screen\n```txt\nCommands\n\n - help             : Displays this page\n - wordlist         : Provide a wordlist file     \n - scan             : Performs a WI-FI scan       \n - interface        : Open Interface Management   \n - attack           : Attacks selected WI-FI      \n - counter          : Sets the attack counter     \n - exit             : Close the program\n\n For more information, please refer to \"README.md\".\n\n More projects from TechnicalUserX:\n https://github.com/TechnicalUserX\n\n\nPress any key to continue...\n```\n","funding_links":[],"categories":["HarmonyOS"],"sub_categories":["Windows Manager"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FExtremePro11299%2Fbatch_wifi_brute_forcer","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FExtremePro11299%2Fbatch_wifi_brute_forcer","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FExtremePro11299%2Fbatch_wifi_brute_forcer/lists"}