A portable, extensible framework for network reconnaissance and MITM attacks on WiFi, BLE, HID, CAN-bus, IPv4, and IPv6 networks.
bettercap is a powerful, extensible security framework written in Go for network reconnaissance and man-in-the-middle attacks. It provides an all-in-one solution for assessing and exploiting WiFi networks, Bluetooth Low Energy devices, HID wireless devices, CAN-bus systems, and IPv4/IPv6 networks. The tool consolidates multiple attack vectors and reconnaissance techniques into a single portable platform.
Security researchers, red teamers, reverse engineers, and penetration testers who need a comprehensive tool for network security assessments and offensive operations.
Developers choose bettercap for its versatility, ease of use, and extensive feature set covering multiple network protocols and wireless technologies in one framework. Its extensibility through JavaScript plugins, REST API, and web UI makes it highly adaptable for complex security testing scenarios.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
bettercap consolidates diverse attack vectors like WiFi deauthentication, Bluetooth Low Energy scanning, and MITM spoofing into a single framework, eliminating the need for multiple specialized tools as highlighted in its feature list.
It supports JavaScript plugins for scripting proxies and offers a REST API with websocket notifications, allowing security researchers to customize and automate attacks for complex scenarios.
Written in Go, bettercap runs on Linux, macOS, and Windows with Docker support, making it easy to deploy in varied testing environments without compatibility issues.
The included web UI provides a user-friendly way to monitor and orchestrate attacks, as demonstrated in the README screenshot and documentation, reducing reliance on command-line only.
Many core features, such as network spoofing and WiFi attacks, necessitate root or administrator access, which can be a barrier in locked-down or corporate environments.
Despite the web UI, effective use demands deep networking knowledge and command-line proficiency for configuration and scripting, making it challenging for novices without extensive security background.
As an open-source framework, it lacks built-in features for centralized logging, team collaboration, or seamless integration with SIEM systems, which are critical for large-scale security operations.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.