This is a community effort to study and improve security of WPA protected WiFi networks. You can contribute to WPA security research - the more handshakes you upload, the more stats, and the more we'll understand how feasible WPA cracking is in practice.
This site is based on sorbo's work on Source code is available at GitHub. Big thanks to RealEnder as this site is based from his. Make sure to check it out at Maybe someday I will make the site all pretty and such but anit nobody got time for that. If you do and want to write a nice page for me feel free to shoot me an email below.


First step is to issue your own key. This is nessesary if you want to see the results from your uploaded handshakes. To obtain the WPA handshake, use wlandump-ng or wlanresponse from hcxtools repo. hcxtools is new generation sophisticated set of tools for WPA audit and penetration tests. You can then upload valid libpcap format captures via the web interface.
Note: please do not use any additional tools to strip capture files, since they can mangle handshakes and lead to uncrackable results.

Custom WPA cracking

Custom cracking is avalabie just shoot an email below for a price. Looking at about 0.50 USB per GB.

Distributed WPA cracking

There is a small dedicated resource on this machine for handshake cracking. Some work can be done from volunteers like you, who contribute CPU/GPU to the cracking process by running [CHANGELOG], a script that will automatically fetch uncracked network, download wordlist, try to crack, and upload the results to this site. Prerequisite: you must have python 2.7, Hashcat, pyrit or aircrack-ng installed.

Cracking under Windows

Install Python 2.7 from here and Python for Windows extensions from here. You can download precompiled binary of aircrack-ng for windows here, or use Hashcat for Windows.
Put executables and in same directory and run from cmd shell.