There are 37 repositories under evil-twin topic.
This is a multi-use bash script for Linux systems to audit wireless networks.
Fluxion is a remake of linset by vk496 with enhanced functionality.
Work in progress...
An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32 and ESP8266
Using Social Engineering To Obtain WiFi Passwords
Enhanced functions and new features for airgeddon!
Learn how to set up a fake authentication web page on a fake WiFi network.
A super portable evil device, based on the ESP8266 board, running Micropython and equipped with a single button and a small OLED display
An open-source ESP8266_Deauther with customizable Evil Twin attack, and WiFi signal strength checker, with a user-friendly web interface and Display interface and more.
Simple Karma Attack
ESP8266 deauther with basic phishing captive portal (AKA evil twin attack)
Python script to perform phishing attacks through captive portals, made for learning purposes
⚡ Perform Evil Twin Attack Using NodeMCU Board
DDos and Evil Twin Combo
Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less bugs.
The Present of Wireless Attacks for Linux systems
tool to help you automate the evil twin attack in a specific, easy and quick way
Huawei login page extracted from real device and modified for #Evil-twin attack
This is a WiFi Tool which includes EvilTwin and Deauther, this tool is based on esp8266_deauther, this tool fully runs on esp8266
😈 Evil Portal implementation for the M5Stack Core S3
The work intends to test the data security of the IoT system since extremely sensitive data is being sent. Vulnerabilities that can lead to the leak of this personal data is found. This project illustrates a process for identifying a vulnerability and proposes a solution for mitigating the same.
A network attack using Evil Twin Framework paired in NodeMCU ESP8266 device to exploit vulnerabilities in WiFi with low cost