You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
VeilCast is a semi-automated Evil Twin attack Hacking framework written in Python. It simplifies the process of setting up rogue Wi-Fi access points, launching captive portals, and capturing credentials—all while giving the user fine-tuned control over configurations and presets.
Wi-Fi Attack Automation Tool for Kali Linux and Windows PowerShell automates Wi-Fi attacks like Deauthentication, Evil Twin, and WPA Handshake Capture. Ideal for cybersecurity enthusiasts to learn and practice network penetration testing and Wi-Fi security.
An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate network. Once a user is connected to an “evil twin” network, hackers can access everything from their network traffic to private login credentials
😈 A program in Python which attacks a user over the internet in order to steal his login information + 🛡 A program for protecting the user from such an attack.