Here are
29 public repositories
matching this topic...
This is a multi-use bash script for Linux systems to audit wireless networks.
Updated
Jun 22, 2022
Shell
Fluxion is a remake of linset by vk496 with enhanced functionality.
Updated
Jul 15, 2022
HTML
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Updated
Nov 22, 2019
Shell
An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
Updated
Jun 30, 2022
Python
A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
Updated
Jan 8, 2021
Python
Automated rogue access point setup tool.
Using Social Engineering To Obtain WiFi Passwords
Updated
Oct 1, 2020
Shell
Enhanced functions and new features for airgeddon!
Updated
Jan 19, 2022
Shell
A super portable evil device, based on the ESP8266 board, running Micropython and equipped with a single button and a small OLED display
Updated
Jun 5, 2020
Python
ESP8266 deauther with basic phishing captive portal (AKA evil twin attack)
Learn how to set up a fake authentication web page on a fake WiFi network.
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32 and ESP8266
Python script to perform phishing attacks through captive portals, made for learning purposes
Updated
Apr 4, 2021
Python
Make a Fake wireless access point aka Evil Twin....Easily!!
Updated
May 13, 2021
Python
Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less bugs.
Updated
Jul 28, 2018
Shell
Updated
Jul 26, 2021
Python
The Present of Wireless Attacks for Linux systems
Updated
Apr 8, 2021
Shell
Facebook Hacking Setup Fake Captive Portal Page on Esp8266.
Simple script to setup a local hosted network for Mobile Application Penetration Testing
Updated
Sep 29, 2020
Shell
The work intends to test the data security of the IoT system since extremely sensitive data is being sent. Vulnerabilities that can lead to the leak of this personal data is found. This project illustrates a process for identifying a vulnerability and proposes a solution for mitigating the same.
Updated
Nov 12, 2021
HTML
I do not know what I am doing yet! But it is my research. So please do not steal it, not yet!
Forked version of Wi-PWN by samdenty99.
Huawei login page extracted from real device and modified for #Evil-twin attack
Saffron Point 108 ________ wave your Saffron Flag!
Autonomous system for penetrating and colecting data from wireless networks - Final Project for my engineer's degree
Updated
Apr 5, 2022
Python
An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is connected to an “evil twin” network, hackers can access everything from their network traffic to private login credentials
Updated
May 11, 2022
Python
Improve this page
Add a description, image, and links to the
evil-twin
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
evil-twin
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.