bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks. Main Features: - WiFi networks scanning, deauthentication attack, clientless PMKID association attack and automatic WPA/WPA2 client handshakes capture. - Bluetooth Low Energy devices scanning, characteristics enumeration, reading and writing. - 2.4Ghz wireless devices scanning and MouseJacking attacks with over-the-air HID frames injection (with DuckyScript support). - Passive and active IP network hosts probing and recon. - ARP, DNS, NDP and DHCPv6 spoofers for MITM attacks on IPv4 and IPv6 based networks. - Proxies at packet level, TCP level and HTTP/HTTPS application level fully scriptable with easy to implement javascript plugins. - A powerful network sniffer for credentials harvesting which can also be used as a network protocol fuzzer. - A very fast port scanner. - A powerful REST API with support for asynchronous events notification.
Common questions about bettercap including features, pricing, alternatives, and user reviews.
bettercap is A powerful and extensible framework for reconnaissance and attacking various networks and devices. It is a Security Operations solution designed to help security teams with Wireless Security, Network Reconnaissance.
bettercap is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/bettercap/bettercap/ for download and installation instructions.
Popular alternatives to bettercap include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
bettercap is for security teams and organizations that need Wireless Security, Network Reconnaissance. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Private training course for IoT device pentesting and exploitation
DNS reconnaissance tool checking DNS records, subdomains, and third-party svcs
Automated hardware reversing platform using robotics for embedded device analysis