11-20-2021, 06:19 PM
The Hash monster is simply the tool I am using to capture the handshakes, and output them in the pcaps. From there I am planning to use Hashcat to actually do the brute-forcing/cracking.
The project is here: https://github.com/G4lile0/ESP32-WiFi-Hash-Monster
The project is here: https://github.com/G4lile0/ESP32-WiFi-Hash-Monster