Skip to content

Evil_Twin

LOCOSP edited this page Oct 28, 2025 · 3 revisions

Evil Twin — Ops

🟧 Evil Twin Attack — The Doppelgänger Protocol 🟧

How it works:

  • Scan and select networks.
  • Clone SSID (first selected).
  • Deploy captive portal using SD HTML.
  • Capture and validate passwords.
  • Success: deauth stops, credentials logged (EVILTWIN.TXT).

Workflow:

  1. scan_networks
  2. select_networks 1 2
  3. list_sd
  4. select_html 1
  5. start_evil_twin

🌐 Passwords are saved to SD card for future infiltration.


Clone this wiki locally