Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/richstokes/evilportal-m5stack
😈 Evil Portal implementation for the M5Stack Core S3
https://github.com/richstokes/evilportal-m5stack
arduino esp32-s3 evil-twin hacking m5stack phishing-attacks wireless-security
Last synced: 11 days ago
JSON representation
😈 Evil Portal implementation for the M5Stack Core S3
- Host: GitHub
- URL: https://github.com/richstokes/evilportal-m5stack
- Owner: richstokes
- License: mit
- Created: 2023-12-09T02:30:33.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2023-12-13T02:17:52.000Z (about 1 year ago)
- Last Synced: 2023-12-13T03:56:22.982Z (about 1 year ago)
- Topics: arduino, esp32-s3, evil-twin, hacking, m5stack, phishing-attacks, wireless-security
- Language: C
- Homepage:
- Size: 8.79 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
"Evil" Access Point / Captive Portal implementation for the [M5Stack CoreS3](https://www.amazon.com/gp/product/B0C7G5GPGC/ref=ppx_yo_dt_b_search_asin_title?ie=UTF8&psc=1). The M5 is nicely suited to this as it has a battery built in.
For educational purposes only :-)
Â
## How to use / how it works
1. Change the `ssid` to whatever access point name you want to pretend to be
1. Change the contents of `html.h` to resemble the login screen for the service you wish to phish
1. Once someone connects to the AP and submits their credentials, they will be displayed on the screen and echo'd to the serial port.It would be pretty easy to modify this to store to an SD card or something similar if you wanted to let it run for a long time.
Â
## Libraries:
- https://github.com/dvarrel/ESPAsyncWebSrv