Skip to content

Latest commit

 

History

History
 
 

Evil Portal

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Evil Portal Examples and Information

Place the .html landing page of your choice in the root of your SD.

On your Marauder: WiFi -> Sniffers -> Scan APs -> WiFI General -> Add SSIDS (manually) or Select APs -> Select EP HTML File.

The ESP32 access point will not have internet access while hosting the portal, as a result there cannot be any requests for stylesheets or javascript such as CDNs for bootstrap and JQuery.

All HTML/CSS/JS must be in a single HTML file. This is due to the fact that the index.html kept in the memory of the esp32.

There is a 20k character limit for each HTML file.

The form data must be sent to the /get endpoint as a GET request with the params email & password. You can put any information you want in these two fields. For example the email param can contain a username instead, just keep the param name as email.

Contributors

Thank you so much to the following contributors for providing awesome portals.

Disclaimer

These captive WiFi login portals designed specifically for educational purposes. These portals have been carefully developed to offer a hands-on experience in the field of cybersecurity and penetration testing. As a responsible provider, I would like to emphasize that any illegal use of these portals is strictly prohibited.

It is crucial to acknowledge that using these portals for any unauthorized activities, such as hacking into networks or attempting to access sensitive information without proper authorization, is deemed illegal and unethical. I strongly discourage engaging in any activities that may cause harm, compromise network security, or infringe upon others' privacy rights.

By accessing and utilizing the captive WiFi login portals, users take complete responsibility for their actions and the consequences that may arise from them. I expect users to act responsibly, adhere to ethical guidelines, and ensure that their activities remain within the boundaries of the law and ethical norms.

Remember, these portals are aimed at promoting knowledge, improving cybersecurity skills, and raising awareness about the potential vulnerabilities present in network infrastructures. I encourage you to explore the portals, learn from them, and embrace the opportunity to enhance your understanding in a controlled and legal environment.

Don't be foolish.