-
Aircrack:
Capture client handshake and check the user input password (Only WPA/WPA2). -
Evil Twin Attack:
Creates a rogue access point (AP) mimicking the target network, thus tricking clients into connecting to it. -
Captive Portal:
Victims will be automatically redirected to the Captive Portal page upon connecting to the fake access point. -
Advanced deauthentication technique:
Supports new advanced techniques for Wi-Fi 6 deauthentication like negative TX power constraint, EAPOL-logoff, EAP-Failure, Malformed Handshare message 1, Invalid PMKID, EAPOL Rounds and EAPOL start spamming. -
Automatic Vendor Identification:
Support for vendor identification based upon SSID name and capturing beacon frame (TO DO). -
Phishing Scenarios:
Serves customized phishing pages to capture sensitive information, such as login credentials. -
Compact and Portable:
Runs on the ESP32, making it lightweight and suitable for hardware testing scenarios. -
Configurable via Web Interface:
Allows customization of network settings and phishing scenarios through a web interface.
- [☑] Add a channel tracking functionality (some AP may switch channels)
- [☑] Add a handshake capture and basic aircrack implementation to check a user input password
- Add a telegram/email notification when password is succesfully stealed
Use the Online Flasher to flash your device.
WifiPhisher for ESP32 is a custom implementation of a phishing tool designed for the ESP32 microcontroller. It performs Evil Twin attacks, allowing users to test the security of Wi-Fi networks and execute social engineering phishing scenarios. The project is built using PlatformIO and the ESP-IDF framework.
-
ESP32 Development Board:
Any ESP32 board with Wi-Fi capability (e.g., ESP32-WROOM-32). -
Power Source:
A USB connection or battery to power the ESP32.
-
PlatformIO:
Integrated into your IDE (e.g., Visual Studio Code). Install PlatformIO. -
ESP-IDF Framework:
Required for building and flashing the firmware. PlatformIO automatically configures this as part of the development environment.
git clone https://github.com/Alexxdal/WifiPhisher.git
cd WifiPhisherOpen the project in your IDE (e.g., Visual Studio Code) and ensure that PlatformIO is correctly set up:
- Check the
platformio.inifile in the project root:- Verify that the
platform,board, andframeworkmatch your ESP32 development board. - Example configuration in
platformio.ini:[env:esp32dev] platform = espressif32 board = esp32dev framework = espidf
- Verify that the
- Install necessary dependencies by allowing PlatformIO to resolve them during the first build.
To build and upload the firmware to your ESP32:
- Connect your ESP32 board to your computer via USB.
- In the PlatformIO terminal, run the following command:
pio run --target upload
To debug or monitor the ESP32's output logs:
- Use PlatformIO serial monitor:
pio device monitor- To stop the monitor, press
Ctrl+C.
- Connect to the ESP32 rogue AP (default: "MagicWifi").
- Open a browser and go to
http://192.168.4.1:8080/.
- Select the target Wi-Fi network to impersonate.
- Choose a phishing scenario (e.g., fake login page).
Once configured, the ESP32 will execute the Evil Twin attack and serve the phishing page.
Here are some visual examples of the tool in action:
Contributions are welcome! You can improve phishing scenarios, optimize performance, or add new features.
This tool is intended strictly for educational purposes and ethical hacking in controlled environments. Unauthorized use of WifiPhisher for malicious purposes is illegal and punishable by law. Always ensure you have explicit permission before conducting any testing.


