Skip to content
7h30th3r0n3 edited this page Jan 2, 2025 · 3 revisions

Evil-M5Project Wiki

Welcome to the Evil-M5Project Wiki, your go-to source for everything you need to know about Evil-M5Project for ethical WiFi network exploration and penetration testing.

Disclaimer: The creator of Evil-M5Core2 is not responsible for any misuse of this tool. It is intended solely for ethical and educational purposes. Users are reminded to comply with all applicable laws and regulations in their jurisdiction. All files provided with Evil-M5Core2 are designed to be used in a controlled environment and must be used in compliance with all applicable laws and regulations. Misuse or illegal use of this tool is strictly prohibited and not supported by the creator.


Introduction

Evil-M5Project is a feature-rich framework designed to aid in understanding network security and identifying vulnerabilities. With its ethical and educational focus, this project is perfect for network administrators, security researchers, and penetration testers and make it a really affordable hardware plateform to learn about WiFi, Bluetooth and networking.


All Evil-M5Project Features

  • Scan WiFi Network: Identify and display nearby WiFi networks.

  • Select WiFi Network: Select the wifi network you want to target.

  • Network Cloning: Check information and replicate networks for deploying html portal page.

  • Captive Portal Management: Create and operate a captive portal to prompt users with a page upon connection.

  • Check Credential: Check captured credentials.

  • Probes Attack: Send random or customized probes to counter Sniffer.

  • Sniffing Probes: Sniff and store nearby probes on an SD card.

  • Karma Attack: Try a simple Karma Attack on a captured probe.

  • Automated Karma Attack: Try Karma Attack on nearby probes automatically.

  • Karma Spear: Try Karma Attack on captured open network during wardriving session.

  • Bluetooth Serial Control: You can control it with Bluetooth.

  • Wardriving: Wardriving with Wigle format output on SD.

  • Wardriving Master: Perform Wardriving with multiple esp32 wardriving slave to map networks in a defined area, analyzing signals and identifying access points.

  • Beacon Spam: Generate multiple SSIDs around you.

  • Deauther: Send deauthentication frames and sniff 4-Way handshakes and PMKID in parrallel.

  • Handshake Master: Capture and analyze WPA/WPA2 handshakes with multiple ESP32 Sniffer Slave on hopping or static channel.

  • WiFi Raw Sniffing: Conduct raw packet captures in a pcap on static channel for in-depth analysis of exchanged WiFi network data.

  • Sniff Raw Client: Capture traffic from connected clients to analyze communications and detect potential vulnerabilities and information leaks.

  • Wifi Channel Visualizer: Check AP distribution across 14 channels and print results with graph dynamically.

  • Client Sniff And Deauth: Sniff clients connected to AP near you and auto deauth while sniffing EAPOL.

  • EAPOL/Deauth detection: Detect deauthentication packets, 4-Way handshakes, PMKID, and pwnagotchi near you.

  • Wall Of Flipper: Detect and save Flipper Zero with Bluetooth enabled near you and detect BLE SPAM.

  • Send Tesla code with RFunit: Use RFunit to send Tesla codes, mimicking Flipper Zero capabilities.

  • SSH Shell: Connect to SSH servers directly from the device, allowing command execution via an on-device shell.

  • Scan Network and Port: Perform network and port scans to discover devices and services, checking hosts' status.

  • Full Network Scan: Conduct a full network scan to identify connected devices, open ports, and running services.

  • Web Crawler: Crawl websites to extract information, ensuring authorization to crawl before use.

  • PwnGridSpam: Spam face and message on pwnagotchi devices nearby, causing a Denial of Screen PWND.

  • Skimmer Detector: Detect potential Bluetooth skimmers using HC-03, HC-05, and HC-06 modules.

  • BadUSB: BadUSB attacks by emulating keyboard/mouse inputs to execute predefined scripts or commands with provided script.

  • Bluetooth Keyboard: Simple bluetooth keyboard.

  • Reverse TCP Tunnel: Implant and control the device remotely using a Command & Control (C2) Python server.Execute network scans, capture credentials, and run BadUSB scripts remotely.

  • DHCP Starvation Attack: Execute DHCP Starvation Attack to exhaust DHCP pool and disrupt network IP allocation.

  • Rogue DHCP Server: Set up a Rogue DHCP Server for malicious configuration and DNS redirection.

  • Switch DNS: Change IP of DNS spoofing to redirect HTTP requests to a captive portal on local network.

  • Network Hijacking: Perform the entire process interactively with automated guidance.

  • Printer Attack: Detect printers with open port 9100 on the connected network.Print files stored on the SD card to detected printers. Check printer status using SNMP for toner levels, paper status, and device errors.

  • Remote Web Server: Monitor the device remotely via a simple web interface. Check credentials, download/upload/edit files on sdcard, Setup portal, Run BadUSBScript remotly, Scan local network and monitor status.

  • Customing Theming: Customize the tool’s interface and themes to tailor the appearance for specific preferences or mission needs.


Supported Hardware

Evil-M5Project supports multiple M5Stack devices and ESP32-based hardware.

Working devices include:

  • M5Cardputer
  • M5Core2
  • M5Stack Fire
  • M5AtomS3
  • M5Core3

Beta :

  • M5Stick Cplus 1.1
  • M5Stick Cplus 2
  • CYD2USB

Additional hardware options, such as GPS modules and external antennas, can enhance functionality for specific features like wardriving.


Join the Community

Stay updated and connect with other users:


Explore the tabs to dive deeper into each topic and unlock the full potential of Evil-M5Project!

UNDER CONSTRUCTION !

Clone this wiki locally