evil-twin
Here are 20 public repositories matching this topic...
An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
-
Updated
Oct 30, 2024 - Python
Wi-Fi Attack Automation Tool for Kali Linux and Termux automates Wi-Fi attacks like Deauthentication, Evil Twin, and WPA Handshake Capture. Ideal for cybersecurity enthusiasts to learn and practice network penetration testing and Wi-Fi security.
-
Updated
Feb 14, 2026 - Python
Make a Fake wireless access point aka Evil Twin....Easily!!
-
Updated
Apr 22, 2023 - Python
A super portable evil device, based on the ESP8266 board, running Micropython and equipped with a single button and a small OLED display
-
Updated
Jun 5, 2020 - Python
Pentesting Suite
-
Updated
Jul 1, 2025 - Python
Python script to perform phishing attacks through captive portals, made for learning purposes
-
Updated
Sep 22, 2022 - Python
WiFi-Nightmare: Hybrid WiFi Auditor. 🎛️ Python CLI Control | 📟 ESP32/ESP8266 Hardware Acceleration | 😈 Evil Twin | 🔓 Handshake Capture | 📡 Deauth
-
Updated
Dec 22, 2025 - Python
MicroPython ESP32 Pentesting Suite
-
Updated
May 13, 2024 - Python
🎯 Pi 5 Wardriving & Wireless Pentest Platform | WiFi/BLE/SDR Attacks | WPA3 • Evil Twin • Karma • Evilginx | GPS Mapping | Cloud Cracking | Part of MoMo Ecosystem
-
Updated
Dec 25, 2025 - Python
VeilCast is a semi-automated Evil Twin attack Hacking framework written in Python. It simplifies the process of setting up rogue Wi-Fi access points, launching captive portals, and capturing credentials—all while giving the user fine-tuned control over configurations and presets.
-
Updated
Oct 17, 2025 - Python
An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is connected to an “evil twin” network, hackers can access everything from their network traffic to private login credentials
-
Updated
Aug 10, 2022 - Python
Ultimate WiFi Security Hub: Automated handshake capture, PMKID analysis, and network auditing research. (WIP) is growing rapidly! We are currently refining every line of code to ensure this project delivers maximum value to the security community. Have a brilliant idea? Now is the perfect time to contribute or show your support by dropping
-
Updated
Jan 11, 2026 - Python
Autonomous system for penetrating and colecting data from wireless networks - Final Project for my engineer's degree
-
Updated
Apr 5, 2022 - Python
An open source tool to detect deauth, Evil Twin, Clonned wifi, Arp Spoofing and Man in the Middle attacks.
-
Updated
Mar 13, 2025 - Python
😈 A program in Python which attacks a user over the internet in order to steal his login information + 🛡 A program for protecting the user from such an attack.
-
Updated
May 17, 2022 - Python
Professional Wireless Penetration Testing Framework - Advanced toolkit for ethical WiFi security assessment with WPA/WPA2/WPA3 support, PMKID attacks, Evil Twin, and comprehensive wireless auditing capabilities.
-
Updated
Nov 4, 2025 - Python
An open source tool to detect deauth, Evil Twin, Clonned wifi, Arp Spoofing and Man in the Middle attacks. This is service version of Wireless Protect
-
Updated
Mar 13, 2025 - Python
Improve this page
Add a description, image, and links to the evil-twin topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the evil-twin topic, visit your repo's landing page and select "manage topics."