A Python tool to generate synthetic WPA2 EAPOL (4-Way Handshake) hashes in hc22000 format (Hashcat mode 22000).
This tool allows you to create valid test hashes for password cracking research or Hashcat benchmarking without needing to capture a real handshake from the air.
- Generates valid WPA2 PMK, PTK, KCK, and MIC.
- Constructs a raw EAPOL frame (Message 2 of 4).
- Outputs a ready-to-crack hash line in Hashcat hc22000 (Type 02) format.
- Interactive mode to specify SSID, MAC addresses, and known Password.
- Creates a
pass.txtwordlist for immediate testing.
No external dependencies are required. The script uses Python's standard library.
# Clone the repository
git clone https://github.com/professor606/WPA2-EAPOL-Hash-Generator.git
cd WPA2-EAPOL-Hash-Generator
# Make the script executable
chmod +x script.pyRun the script using Python 3:
python3 script.pyThe script will prompt you for the following details. You can press Enter to use the default values.
- SSID: The name of the WiFi network (Default:
WiFi). - Password: The known password for the network (required for PMK calculation).
- AP MAC: The MAC address of the Access Point (Default:
3c17105e3168). - Client MAC: The MAC address of the Client (Default:
ca45f2ff68f2).
[?] Configuration Input (Press Enter to use defaults):
SSID (Default: WiFi): TestAP
Password (required): strongpassword123
AP MAC (Default: 3c17105e3168):
Client MAC (Default: ca45f2ff68f2):
[*] Configuration:
SSID: TestAP
Pass: strongpassword123
[1] Calculating PMK...
PMK: <pmk_hex>
...
[5] Generated Hash Line:
WPA*02*<mic>*<mac>*<mac>*<ssid>*<anonce>*<eapol>*02
[+] Saved to: wifi.hc22000
[+] Saved to: pass.txt
The script generates a file named wifi.hc22000 and a pass.txt wordlist containing the correct password. You can verify the hash immediately with Hashcat:
hashcat -m 22000 -a 0 wifi.hc22000 pass.txtIf successful, Hashcat will crack the hash and show the password.
This tool is for educational and testing purposes only. It generates synthetic data based on known credentials. Do not use this tool to assist in unauthorized access to networks you do not own or have permission to test.