dEEpEst
☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
- Joined
- Mar 29, 2018
- Messages
- 13,861
- Solutions
- 4
- Reputation
- 32
- Reaction score
- 45,552
- Points
- 1,813
- Credits
- 55,350
7 Years of Service
56%
FAPA - Fake Access Point Attack Tool
Overview
The Fake Access Point Attack Tool is a proof-of-concept (PoC) designed to demonstrate the risks associated with connecting to "free Wi-Fi" access points. This tool simulates a malicious access point to lure victims and then allows you to execute various attacks such as Man-In-The-Middle (MITM), phishing, vulnerability scanning, and packet manipulation.Disclaimer:
This tool is provided for research and educational purposes only. Use it only in environments where you have explicit permission to perform security testing. Unauthorized use on networks without consent is illegal and unethical. By using this tool, you agree that the developers are not responsible for any damage or legal issues that may arise from its misuse.
Features
- Fake Access Point Creation:
Create a malicious access point (Fake AP) using hostapd, dnsmasq, and NAT. This helps demonstrate how easily victims can be lured into connecting to a rogue network. - MITM Attacks:
Perform various MITM attacks using:- Bettercap for ARP spoofing.
- Ettercap for DNS spoofing (with GUI and caplets).
- Mitmproxy for Proxy MITM.
- Phishing Portal:
Deploy phishing scenarios using Wifiphisher to capture credentials and sensitive information. - Traffic Sniffing, Injection, and Packet Manipulation:
Capture, analyze, inject, and manipulate network packets using tools like tcpdump and Scapy. - Vulnerability Scanning:
Scan connected devices for vulnerabilities using Nmap with a customizable set of NSE (Nmap Scripting Engine) script categories and arguments. - Client Monitoring:
Monitor in real-time the devices connected to your Fake AP. - Real-Time Notifications:
Receive notifications about connected clients via a Telegram bot. - Reporting:
Generate and analyze reports in CSV format detailing the outcomes of attacks and scans. - Network Configuration Restoration:
Quickly restore the network configuration to its original state after testing. - Future Internationalization:
Planned support for multiple languages to accommodate researchers worldwide.
Screenshot
This link is hidden for visitors. Please Log in or register now.
New Version v0.2

Fake Access Point Attack v0.2
- Release 0.2
What's new?
- Check the version to update to the latest version
- Comprehensive translation into English for internationality
- Color is added for easy understanding
About
The Fake Access Point Attack Tool is a proof-of-concept (PoC) designed to demonstrate the risks associated with connecting to "free Wi-Fi" access points. This tool simulates a malicious access point to lure victims and then allows you to execute...
- dEEpEst
- Replies: 0
- Forum: Hacking Tools
Last edited: