https://github.com/vrikodar/rudrastra
Make a Fake wireless access point aka Evil Twin....Easily!!
https://github.com/vrikodar/rudrastra
evil-twin evil-twin-attack evilt-twin eviltwin fake-ap fake-wifi hacking-tool hackwii man-in-the-middle-attack mitm mitm-attacks wifi-hacking-script wifi-security wpa2
Last synced: 10 days ago
JSON representation
Make a Fake wireless access point aka Evil Twin....Easily!!
- Host: GitHub
- URL: https://github.com/vrikodar/rudrastra
- Owner: vrikodar
- License: bsd-3-clause
- Created: 2020-11-05T09:38:15.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2023-04-22T15:10:42.000Z (about 2 years ago)
- Last Synced: 2025-03-27T05:23:36.563Z (27 days ago)
- Topics: evil-twin, evil-twin-attack, evilt-twin, eviltwin, fake-ap, fake-wifi, hacking-tool, hackwii, man-in-the-middle-attack, mitm, mitm-attacks, wifi-hacking-script, wifi-security, wpa2
- Language: Python
- Homepage:
- Size: 485 KB
- Stars: 66
- Watchers: 4
- Forks: 21
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
[

**`The All in One Weapon For Making Fake Access point!`**
**NOTE** : My repositories are only hosted on my offcial github page https://github.com/SxNade and May be refered on other page at https://SxNade.github.io , If you find some-body else claiming or posting them on some-kind of website social media etc.. Don't Trust it. I never publish anything about my repos on any other platform than my official github page https://github.com/SxNade or at https://SxNade.github.io
# No Longer Maintained
- This Project is no longer updated
- A Better Version of same Project can be found at [https://github.com/SxNade/SP-108](https://github.com/SxNade/SP-108)# ππ‘π¦π§πππππ§ππ’π‘ ππ‘π¦π§π₯π¨ππ§ππ’π‘π¦
TO Install all The Required Dependencies...RUN THE FOLLOWING COMMANDS$ git clone https://github.com/SxNade/Rudrastra
$ cd Rudrastra
$ chmod +x install.sh$ ./install.sh
# π π’π₯π ππ‘ππ’
These Scripts Work Best With Python3
**`Use Python3 to run the Scripts`**
# πππππππ πππ ππΌππ-πΌπ
# ππππ 1
This step involves configuring the IPtable rules and preparing the interfaces..!`python3 internet.py `
# ππππ 2
This step involves Configuring DHCP Server To assign IP address to Devices Connecting to our AP!`python3 dhcp.py`
# ππππ 3
This Step involves setting up the Fake-Ap and Finally running it..`python3 fake_ap.py`
# ππππ 4
`Now WE have our Fake AP Running we can Now Use Wireshark to Sniff Packets by selecting the FAKE-AP interface..`# ππππ 5
After Closing DHCP and FAKE-AP... you can ...run following commands to reset IP table rules and other modifications made..!`chmod +x reset.sh`
`./reset.sh`
# π΄π¨π²π¬_π°π»_π©π¬π»π»π¬πΉ
To make Rudrastra Even Better Contribute to it Or use and Report Any Bugs or fixes Required...`git clone https://github.com/SxNade/Rudrastra`
