EAPHammer alternatives

Looking for an alternative tool to replace EAPHammer? During the review of EAPHammer we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. trackerjacker (Track WiFi devices using raw 802.11 traffic)
  2. Wifiphisher (phishing attack tool for WiFi)
  3. Wireshark (network traffic analyzer)

These tools are ranked as the best alternatives to EAPHammer.

Alternatives (by score)

60

trackerjacker

Introduction

Trackerjacker is a security tool to map WiFi networks that you are not connected to. It allows mapping and tracking of devices using the 802.11 protocol. It may be useful for intelligence gathering or performing specific WiFi attacks, such as a deauthentication attack. The tool comes with plugin support so that it can interact with other tools. For example, when a particular event occurs it can be picked up by another tool.

Project details

trackerjacker is written in Python.

Strengths and weaknesses

  • + The source code of this software is available
  • - Requires root permissions

Typical usage

  • Network scanning
  • Network spoofing
  • Network traffic analysis
  • Penetration testing

trackerjacker review

78

Wifiphisher

Introduction

Wifiphisher would have a good usage in security assessments to obtain credentials. In that regard it is considered to be an offensive tool, especially considering it could be used to infect the systems of victims with malware. Wifiphisher is not a brute forcing tool, but more focused to perform a social engineering attack.

Project details

Wifiphisher is written in Python.

Strengths and weaknesses

  • + More than 25 contributors
  • + More than 5000 GitHub stars
  • + The source code of this software is available

    Typical usage

    • Phishing attacks
    • WiFi security analysis

    Wifiphisher review

    67

    Wireshark

    Introduction

    Wireshark is a mature project with many users all over the world. Its library is stable and can be used by both graphical as text-based interfaces. With many books and even conferences around the subject, this tool is a safe bet to have in your toolbox.

    Project details

    Wireshark is written in C.

    Strengths and weaknesses

    • + The source code of this software is available
    • + Well-known tool

      Typical usage

      • Network analysis
      • Network traffic analysis
      • Security assessment
      • Troubleshooting

      Wireshark review

      78

      aircrack-ng

      Introduction

      This toolkit focuses on several aspects:

      • Testing: Test WiFi devices and capabilities of the driver
      • Monitoring: Packet capture and data export
      • Attacking: Perform replay attacks, de-authentication, set up fake access points, and perform packet injection
      • Cracking: Perform attacks on WEP and WPA PSK (WPA 1 and 2)

      Project details

      aircrack-ng is written in C.

      Strengths and weaknesses

      • + Project is mature (10+ years)
      • + The source code of this software is available
      • + Well-known tool

        Typical usage

        • Hardware security
        • Network scanning
        • Security assessment

        aircrack-ng review

        85

        airgeddon

        Introduction

        Tools like Airgeddon can be used to test the security of wireless networks. It is flexible and written in shell script, making it fairly easy to understand what is does and how it works.

        Project details

        airgeddon is written in shell script.

        Strengths and weaknesses

        • + Used language is shell script
        • + The source code of this software is available
        • - Full name of author is unknown

        Typical usage

        • Network analysis

        airgeddon review

        60

        BoopSuite

        Introduction

        BoopSuite a wireless pentesting suite to perform security auditing and test wireless networks. It can be used for penetration tests and security assignments.

        Project details

        BoopSuite is written in Python.

        Strengths and weaknesses

        • + More than 500 GitHub stars
        • + The source code of this software is available
        • - Full name of author is unknown

        BoopSuite review

        64

        WarBerryPi

        Introduction

        WarBerryPi is a toolkit to provide a hardware implant during Physical penetration testing or red teaming. The primary goal of the tool is to obtain as much information as possible, in a short period of time. The secondary goal is to be stealthy to avoid detection. As the name implies, the tool can be used on a small device like a RaspberryPi.

        Another use-case of WarBerryPi is to be an entry point to the network. In that case, a 3G connection is suggested, to avoid the outgoing network filtering (egress rules).

        Project details

        WarBerryPi is written in Python.

        Strengths and weaknesses

        • + More than 2000 GitHub stars
        • + The source code of this software is available
        • - Minimal or no documentation available
        • - No releases on GitHub available

        Typical usage

        • Information gathering
        • Information snooping
        • Penetration testing
        • Red teaming

        WarBerryPi review

        Some relevant tool missing as an alternative to EAPHammer? Please contact us with your suggestion.