11-20-2021, 06:19 PM 
		
	
	
		The Hash monster is simply the tool I am using to capture the handshakes, and output them in the pcaps. From there I am planning to use Hashcat to actually do the brute-forcing/cracking.
The project is here: https://github.com/G4lile0/ESP32-WiFi-Hash-Monster
	
	
	
	
The project is here: https://github.com/G4lile0/ESP32-WiFi-Hash-Monster
 
 

 
