Skip to content

richstokes/EvilPortal-M5Stack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

7 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

"Evil" Access Point / Captive Portal implementation for the M5Stack CoreS3. The M5 is nicely suited to this as it has a battery built in.

For educational purposes only :-)

ย 

How to use / how it works

  1. Change the ssid to whatever access point name you want to pretend to be
  2. Change the contents of html.h to resemble the login screen for the service you wish to phish
  3. Once someone connects to the AP and submits their credentials, they will be displayed on the screen and echo'd to the serial port.

It would be pretty easy to modify this to store to an SD card or something similar if you wanted to let it run for a long time.

ย 

Libraries: