An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
-
Updated
Oct 30, 2024 - Python
An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
A super portable evil device, based on the ESP8266 board, running Micropython and equipped with a single button and a small OLED display
Make a Fake wireless access point aka Evil Twin....Easily!!
Python script to perform phishing attacks through captive portals, made for learning purposes
Pentesting Suite
MicroPython ESP32 Pentesting Suite
Autonomous system for penetrating and colecting data from wireless networks - Final Project for my engineer's degree
Wi-Fi Attack Automation Tool for Kali Linux and Windows PowerShell automates Wi-Fi attacks like Deauthentication, Evil Twin, and WPA Handshake Capture. Ideal for cybersecurity enthusiasts to learn and practice network penetration testing and Wi-Fi security.
An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is connected to an “evil twin” network, hackers can access everything from their network traffic to private login credentials
😈 A program in Python which attacks a user over the internet in order to steal his login information + 🛡 A program for protecting the user from such an attack.
Add a description, image, and links to the evil-twin topic page so that developers can more easily learn about it.
To associate your repository with the evil-twin topic, visit your repo's landing page and select "manage topics."