This is a multi-use bash script for Linux systems to audit wireless networks.
-
Updated
Mar 13, 2023 - Shell
This is a multi-use bash script for Linux systems to audit wireless networks.
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
Automated rogue access point setup tool.
Work in progress...
Using Social Engineering To Obtain WiFi Passwords
Simple Karma Attack
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32 and ESP8266
A super portable evil device, based on the ESP8266 board, running Micropython and equipped with a single button and a small OLED display
Learn how to set up a fake authentication web page on a fake WiFi network.
ESP8266 deauther with basic phishing captive portal (AKA evil twin attack)
Make a Fake wireless access point aka Evil Twin....Easily!!
Python script to perform phishing attacks through captive portals, made for learning purposes
Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less bugs.
Facebook Hacking Setup Fake Captive Portal Page on Esp8266.
The Present of Wireless Attacks for Linux systems
Add a description, image, and links to the evil-twin topic page so that developers can more easily learn about it.
To associate your repository with the evil-twin topic, visit your repo's landing page and select "manage topics."