Skip to main content
Run any Skill in Manus
with one click
$pwd:

offensive-wpa2-psk

// WPA/WPA2-PSK attack methodology — four-way handshake capture via targeted deauthentication, PMKID attacks (no client required), hcxdumptool / hcxpcapngtool conversion to hashcat hc22000 format, GPU-accelerated cracking with dictionary, mask, and rule-based attacks, vendor default-PSK generators (UPC, Sky, BT, etc.), 802.11r FT key cracking, opportunistic key cache analysis, and signal-level optimization. Use when the in-scope network is WPA/WPA2 Personal — the most common consumer/SMB encryption mode.

$ git log --oneline --stat
stars:1,187
forks:206
updated:May 6, 2026 at 08:09
SKILL.md
readonly