evil-twin
Here are 17 public repositories matching this topic...
An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
-
Updated
Oct 30, 2024 - Python
Make a Fake wireless access point aka Evil Twin....Easily!!
-
Updated
Apr 22, 2023 - Python
A super portable evil device, based on the ESP8266 board, running Micropython and equipped with a single button and a small OLED display
-
Updated
Jun 5, 2020 - Python
Wi-Fi Attack Automation Tool for Kali Linux and Windows PowerShell automates Wi-Fi attacks like Deauthentication, Evil Twin, and WPA Handshake Capture. Ideal for cybersecurity enthusiasts to learn and practice network penetration testing and Wi-Fi security.
-
Updated
Jun 28, 2025 - Python
Python script to perform phishing attacks through captive portals, made for learning purposes
-
Updated
Sep 22, 2022 - Python
Pentesting Suite
-
Updated
Jul 1, 2025 - Python
MicroPython ESP32 Pentesting Suite
-
Updated
May 13, 2024 - Python
VeilCast is a semi-automated Evil Twin attack Hacking framework written in Python. It simplifies the process of setting up rogue Wi-Fi access points, launching captive portals, and capturing credentials—all while giving the user fine-tuned control over configurations and presets.
-
Updated
Oct 17, 2025 - Python
Autonomous system for penetrating and colecting data from wireless networks - Final Project for my engineer's degree
-
Updated
Apr 5, 2022 - Python
An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is connected to an “evil twin” network, hackers can access everything from their network traffic to private login credentials
-
Updated
Aug 10, 2022 - Python
An open source tool to detect deauth, Evil Twin, Clonned wifi, Arp Spoofing and Man in the Middle attacks.
-
Updated
Mar 13, 2025 - Python
😈 A program in Python which attacks a user over the internet in order to steal his login information + 🛡 A program for protecting the user from such an attack.
-
Updated
May 17, 2022 - Python
An open source tool to detect deauth, Evil Twin, Clonned wifi, Arp Spoofing and Man in the Middle attacks. This is service version of Wireless Protect
-
Updated
Mar 13, 2025 - Python
🔐 Professional Wireless Penetration Testing Framework - Advanced toolkit for ethical WiFi security assessment with WPA/WPA2/WPA3 support, PMKID attacks, Evil Twin, and comprehensive wireless auditing capabilities.
-
Updated
Nov 4, 2025 - Python
Improve this page
Add a description, image, and links to the evil-twin topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the evil-twin topic, visit your repo's landing page and select "manage topics."