This is a community effort to study and improve security of WPA protected WiFi networks. You can contribute to WPA security research - the more handshakes you upload, the more stats, and the more we'll understand how feasible WPA cracking is in practice.
Source code is available at GitHub.


First step is to issue your own key. This is nessesary if you want to see the results from your uploaded handshakes. To obtain the WPA handshake, use hcxdumptool or wlandump-ng from hcxtools repo. hcxtools is new generation sophisticated set of tools for WPA audit and penetration tests. You can then upload valid pcap format captures via the web interface.
Note: please do not use any additional tools to strip or modify the capture files, since they can mangle handshakes and lead to uncrackable results.

Distributed WPA cracking

There is no dedicated resource on this machine for handshake cracking. All the work is done from volunteers like you, who contribute CPU/GPU to the cracking process by running [CHANGELOG], a script that will automatically fetch uncracked handshake, download wordlist, try to crack, and upload the results to this site. Prerequisite: you must have python and hashcat or John the Ripper "bleeding-jumbo" branch installed.
Put in the same directory as cracker binary and run it from there.

Cracking under Windows

Install Python from here. Put cracker executables and in same directory and run from cmd shell.