bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks. Main Features: - WiFi networks scanning, deauthentication attack, clientless PMKID association attack and automatic WPA/WPA2 client handshakes capture. - Bluetooth Low Energy devices scanning, characteristics enumeration, reading and writing. - 2.4Ghz wireless devices scanning and MouseJacking attacks with over-the-air HID frames injection (with DuckyScript support). - Passive and active IP network hosts probing and recon. - ARP, DNS, NDP and DHCPv6 spoofers for MITM attacks on IPv4 and IPv6 based networks. - Proxies at packet level, TCP level and HTTP/HTTPS application level fully scriptable with easy to implement javascript plugins. - A powerful network sniffer for credentials harvesting which can also be used as a network protocol fuzzer. - A very fast port scanner. - A powerful REST API with support for asynchronous events notification.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
Provides AI-driven cybersecurity solutions including assessments, training, compliance services, and insurance audits to help organizations reduce risk and build a security-aware culture.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
A utility to generate malicious network traffic for security evaluation.
A Python-based web application scanner for OSINT and fuzzing OWASP vulnerabilities
Linux packet crafting tool for testing IDS/IPS and creating attack signatures.
A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.