Hackthelan
A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC bypass techniques to gain unauthorized access.
Install / Use
/learn @revers3everything/HackthelanREADME
HackTheLan 🛠️

HackTheLan is an all-in-one automated offensive toolkit designed for pentesters and red teamers who need to perform on-site LAN/WLAN attacks and network reconnaissance efficiently. Built mainly with Python and Scapy, this tool brings together multiple attack and discovery capabilities in a single interface. Also this tool include SilentBridge that allow you to bypass NAC controls 802.1x to access to the Network.
🔍 Features
[1] Discovery network
[2] Scan a network
[3] Scan a host
[4] MAC Spoofing
[5] IP Spoofing
[6] DHCP Spoofing
[7] ARP poisoning
[8] IPv6 scans
[9] Capture NTLM Hashes
[10] Capture WPA2 Handshake
[11] Hostname Spoofing
[12] Bypass NAC with Silent Bridge
[13] Exit
⚙️ Installation
# Clone the repository
git clone https://github.com/revers3everything/HackTheLan.git
cd HackTheLan
# Install Python dependencies
sudo apt update
sudo apt install python3-scapy
# Install external tool dependencies
sudo apt install nmap netdiscover macchanger aircrack-ng netexec
# Install silent bridge
cd silentbridge/
python3 -m venv myenv
source myenv/bin/activate
sudo ./quick-setup
Note: Make sure you have the following tools installed and accessible from your $PATH:
aircrack-ngairodump-ngairmon-ngnmapnetdiscovermacchangernxc
Usage
Run the tool with:
sudo python3 hackthelan.py
⚠️ Root privileges are required for network interface manipulation and packet crafting.
What It Does
- LAN Discovery: Identify hosts and network devices using tools like
netdiscover,nmap, ornxc. - Bypass the NAC / 802.1x EAP: Use differents attacks that incorporate SilentBridge tool to bypass 802.1x NAC controls
- WLAN Attacks: Capture WPA2 handshakes using
airodump-ng, deauth packets with Scapy. - MAC/IP Spoofing: Bypass NAC restrictions and impersonate devices.
- ARP/DHCP Spoofing: Hijack network traffic and perform MiTM.
- IPv6 Recon: Detect IPv6 hosts and services.
- NTLM Hash Capture: Redirect Windows authentication to steal NetNTLM hashes.
- Automation First: No more switching tools — HackTheLan wraps it all in a single flow.
License
This project is open-source under the MIT License. You are free to modify, distribute, and use this tool with proper credit.
⚠️ Disclaimer
This tool is intended for educational and authorized penetration testing purposes only.
The author is not responsible for any misuse or illegal activity conducted using this software.
Always have proper permission before performing any test on a network.
Author
Danilo Erazo
Security Researcher, Reverse Engineer, Hardware Hacker
Twitter/X: @revers3vrything
DEFCON Car Hacking Village, Ekoparty, Bsides, Nerdearla, Re/verse Conference, Hardwear USA
Related Skills
clearshot
Structured screenshot analysis for UI implementation and critique. Analyzes every UI screenshot with a 5×5 spatial grid, full element inventory, and design system extraction — facts and taste together, every time. Escalates to full implementation blueprint when building. Trigger on any digital interface image file (png, jpg, gif, webp — websites, apps, dashboards, mockups, wireframes) or commands like 'analyse this screenshot,' 'rebuild this,' 'match this design,' 'clone this.' Skip for non-UI images (photos, memes, charts) unless the user explicitly wants to build a UI from them. Does NOT trigger on HTML source code, CSS, SVGs, or any code pasted as text.
openpencil
2.0kThe world's first open-source AI-native vector design tool and the first to feature concurrent Agent Teams. Design-as-Code. Turn prompts into UI directly on the live canvas. A modern alternative to Pencil.
ui-ux-pro-max-skill
58.3kAn AI SKILL that provide design intelligence for building professional UI/UX multiple platforms
hyperblue
Build premium, brand-aware React/Next.js frontends that feel designed by a senior UI engineer, not generated by AI. Use this skill whenever the user wants to create websites, landing pages, dashboards, web apps, React components, or any frontend UI — especially when they provide brand assets (logos, screenshots, colors), mention a specific business or industry, want to match an existing design system, or ask for "non-generic" or "premium" output. Also trigger when the user shares competitor sites for inspiration, asks for design tokens, wants animation direction, or needs responsive brand consistency. This skill replaces generic AI aesthetics with market-aware, brand-calibrated design engineering. Created by Incredible Visibility.
