https://github.com/amiscreant/mirageap
Evil Twin Wi-Fi pentesting tool designed for the ESP8266 platform. It performs targeted deauthentication attacks on a selected Wi-Fi network and simultaneously creates a fake access point (AP) that mimics the target's SSID. The fake AP serves a convincing router firmware update captive portal to capture credentials or perform social engineering.
https://github.com/amiscreant/mirageap
esp8266 esp8266-arduino esp8266-evil-twin esp8266-wifi esp8266-wifi-jammer evil-twin
Last synced: 3 days ago
JSON representation
Evil Twin Wi-Fi pentesting tool designed for the ESP8266 platform. It performs targeted deauthentication attacks on a selected Wi-Fi network and simultaneously creates a fake access point (AP) that mimics the target's SSID. The fake AP serves a convincing router firmware update captive portal to capture credentials or perform social engineering.
- Host: GitHub
- URL: https://github.com/amiscreant/mirageap
- Owner: aMiscreant
- License: mit
- Created: 2025-09-28T09:19:54.000Z (10 days ago)
- Default Branch: main
- Last Pushed: 2025-09-28T09:37:29.000Z (10 days ago)
- Last Synced: 2025-09-28T11:37:08.360Z (10 days ago)
- Topics: esp8266, esp8266-arduino, esp8266-evil-twin, esp8266-wifi, esp8266-wifi-jammer, evil-twin
- Language: C++
- Homepage: https://amiscreant.github.io/projects/MirageAP
- Size: 11.7 KB
- Stars: 1
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README

# MirageAP
MirageAP is an Evil Twin Wi-Fi pentesting tool designed for the ESP8266 platform. It performs targeted deauthentication attacks on a selected Wi-Fi network and simultaneously creates a fake access point (AP) that mimics the target's SSID. The fake AP serves a convincing router firmware update captive portal to capture credentials or perform social engineering.
---
## Features
- **Targeted Deauthentication**
Continuously deauthenticates clients from the selected target network to force them to disconnect.- **Fake Access Point (Evil Twin)**
Creates an open Wi-Fi access point with the same SSID as the target network to lure clients.- **Captive Portal Web Interface**
Serves a realistic router firmware update page to capture user credentials.- **Serial Command Line Interface (CLI)**
Built-in menu accessible via serial monitor for scanning networks, selecting targets, and managing stored data.- **Persistent Scan Results**
Stores Wi-Fi scan results in LittleFS filesystem for later retrieval and selection.- **DNS Spoofing for Captive Portal**
Redirects all DNS queries to the ESP8266 to ensure captive portal activation on connected clients.---
## Usage
1. **Connect the ESP8266 and open the serial monitor at 115200 baud.**
2. **Use the following commands:**
- `scan`
Scan for nearby Wi-Fi networks and store the results.- `load`
Load and display previously stored scan results.- `select `
Select a target network by SSID to start the deauthentication attack and launch the fake AP.- `clear`
Clear stored scan results from memory and filesystem.- `m`
Display the menu and available commands.3. **Connect your client device to the fake AP with the target SSID.**
4. **The captive portal will appear automatically, prompting for credentials.**
---
## Requirements
- ESP8266 development board (e.g., NodeMCU, Wemos D1 Mini)
- Arduino IDE with ESP8266 core installed
- LittleFS filesystem support enabled
- Basic knowledge of serial communication and Wi-Fi pentesting concepts---
## Project Structure
- `MirageAP.ino`
Main sketch handling Wi-Fi scanning, deauthentication, fake AP setup, and serial CLI.- `MirageAP_WebServer.cpp/h`
Web server implementation serving the captive portal pages.- `MirageAP_DNS.cpp/h`
DNS server implementation for captive portal DNS spoofing.- `MirageAP_Utils.cpp/h`
Utility functions such as URL decoding and byte array formatting.- `MirageAP_OLED.cpp/h` *(optional)*
OLED display support for status and menu (if implemented).- `data/`
LittleFS filesystem data including stored scan results and logs.---
## Disclaimer
This tool is intended for authorized security testing and educational purposes only. Unauthorized use against networks or devices without permission is illegal and unethical. Use responsibly.
---
## License
[MIT License]
---
## Acknowledgments
Inspired by common Evil Twin and captive portal techniques used in Wi-Fi security assessments.
---
## Contact
For questions or contributions, please open an issue or pull request on the project repository.