NetCracker is a lightweight but powerful network tool designed to monitor, analyze, and take action in real-time during security assessments.
- Wardriving - WiFi network discovery and mapping
- Wardriving Stationary Mode - Discover wireless clients and non-AP devices
- Deauth Attacks - Disconnect all clients from target SSID
- Targeted Deauth - Disconnect specific clients
- Client Sniffer - Monitor and spy on network client traffic
- Beacon Flood - Spam fake access points
- Packet Analysis - Live metrics and deep packet inspection
- Device Discovery - Identify devices and manufacturers
- Evil Twin Attack - Rogue AP with captive portal for credential harvesting
- Kali Linux
- Arch Linux
Install required system packages before running NetCracker:
Arch Linux:
sudo pacman -S hostapd dnsmasqKali Linux:
sudo apt update
sudo apt install hostapd dnsmasqDisable auto-start for these services:
sudo systemctl stop hostapd dnsmasq
sudo systemctl disable hostapd dnsmasq-
Clone the repository
git clone https://github.com/nsm-barii/netcracker.git cd netcracker/nsm_modules -
Create virtual environment
python -m venv venv source venv/bin/activate -
Install Python dependencies
pip install -r ../requirements.txt
-
Run NetCracker
sudo venv/bin/python nsm_main.py
- Router crash frames
- WiFi password cracking (hashcat integration)
📸 Image above shows NetCracker running on a dual-laptop setup using ALFA adapters for extended wireless penetration testing.