bettercap Logo

bettercap

0
Free
Updated 11 March 2025
Visit Website

bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks. Main Features: - WiFi networks scanning, deauthentication attack, clientless PMKID association attack and automatic WPA/WPA2 client handshakes capture. - Bluetooth Low Energy devices scanning, characteristics enumeration, reading and writing. - 2.4Ghz wireless devices scanning and MouseJacking attacks with over-the-air HID frames injection (with DuckyScript support). - Passive and active IP network hosts probing and recon. - ARP, DNS, NDP and DHCPv6 spoofers for MITM attacks on IPv4 and IPv6 based networks. - Proxies at packet level, TCP level and HTTP/HTTPS application level fully scriptable with easy to implement javascript plugins. - A powerful network sniffer for credentials harvesting which can also be used as a network protocol fuzzer. - A very fast port scanner. - A powerful REST API with support for asynchronous events notification.

FEATURES

SIMILAR TOOLS

MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.

Provides AI-driven cybersecurity solutions including assessments, training, compliance services, and insurance audits to help organizations reduce risk and build a security-aware culture.

Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.

A utility to generate malicious network traffic for security evaluation.

A tool for enumerating subdomains of a given domain

Passive sniffer tool for analyzing traffic patterns.

A Python-based web application scanner for OSINT and fuzzing OWASP vulnerabilities

Linux packet crafting tool for testing IDS/IPS and creating attack signatures.

A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved