Advance mitm attack using fake access point
-
Updated
May 1, 2023 - Python
Advance mitm attack using fake access point
The Fake Access Point Attack Tool is a (PoC) designed to demonstrate the risks associated with connecting to "free Wi-Fi" access points. This tool simulates a malicious access point to lure victims and then allows you to execute various attacks such as Man-In-The-Middle (MITM), phishing, vulnerability scanning, and packet manipulation.
Create Networks or Deauth Networks, Bssids and channels
PortaLhOsT is a program that automates the creation of a completely customizable fake access point with captive portal.
WIDRS (Wireless Intrusion Detection and Response System) is a compact, Raspberry Pi-based solution that detects and alerts on common wireless attacks like deauthentication floods, rogue access points, and Evil Twin APs. Built using Kismet and Kali Linux, it offers real-time monitoring and a graphical dashboard for easy analysis.
Add a description, image, and links to the fake-access-point topic page so that developers can more easily learn about it.
To associate your repository with the fake-access-point topic, visit your repo's landing page and select "manage topics."