This is a multi-use bash script for Linux systems to audit wireless networks.
-
Updated
Oct 2, 2020 - Shell
{{ message }}
This is a multi-use bash script for Linux systems to audit wireless networks.
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
Using Social Engineering To Obtain WiFi Passwords
Simple Karma Attack
ESP8266 deauther with basic phishing captive portal (AKA evil twin attack)
Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less bugs.
c41n is an automated rogue access point setup tool.
The work intends to test the data security of the IoT system since extremely sensitive data is being sent. Vulnerabilities that can lead to the leak of this personal data is found. This project illustrates a process for identifying a vulnerability and proposes a solution for mitigating the same.
Learn how to set up a fake authentication web page on a fake WiFi network.
A super portable evil device, based on the ESP8266 board, running Micropython and equipped with a single button and a small OLED display
Forked version of Wi-PWN by samdenty99.
Simple script to setup a local hosted network for Mobile Application Penetration Testing
Add a description, image, and links to the evil-twin topic page so that developers can more easily learn about it.
To associate your repository with the evil-twin topic, visit your repo's landing page and select "manage topics."