Radiotap (link-type 127) and raw 802.11 (link-type 105) supported
Nothing leaves your browser — all parsing is local
Access Points
SSID
BSSID
Security
Group / Pairwise Cipher
AKM
EAPOL Sessions
Handshake
Action
Target AP
EAPOL Sessions
Advanced Engine
Mode 1 · JS MT
JavaScript worker pool using the selected worker count.
UNDER CONSTRUCTION
Mode 2 · WASM MT
Declaration only. Backend disabled.
UNDER CONSTRUCTION
Mode 3 · WebGPU
Declaration only. Backend disabled.
Dictionary Attack
Drop wordlist here or click to browse
⚠ Some MIC frames use descriptor version 1 (HMAC-MD5 / legacy TKIP).
This cracker uses HMAC-SHA1 — results for those frames may be incorrect.
WPA2/CCMP sessions (descriptor v2) work correctly.