Cr4gg Logo


Crack WPA keys via recorded 4-Way Handshake. This version requires that the 4-Way Handshake is in an isolated pcap file, you can use Wireshark for example, to acquire a result similar to this: Wireshark showing 4-Way Handshake

The current implementation was tested on Wireshark’s wpa-Induction.pcap sample capture.

Example Run:

go run cr4gg.go --ssid Coherer -f $HOME/handshake.pcap -w $HOME/wordlist.txt -v


This project’s solely purpose is to gain more knowledge about wifi security and the language go. Do not use this tool to attack networks you do not have the permission to pentest on.


View Github