Firmware Of This Flasher Tool modified version of M1z23R's ESP8266-EvilTwin v2 with Spacehuhn's Deauther CSS. Modified & Builds By Cancro29
A full-featured Wi-Fi penetration and social engineering tool flasher for ESP8266
https://zeronetfix.github.io/nc281_esp8266
https://zeronetfix.github.io/nc272
https://github.com/zeronetfix/nethercap_2.7.2
This Tool Helps You To Flash Heavily-Modified version of M1z23R's ESP8266-EvilTwin v2 With Spacehuhn's Deauther CSS Moded And Build's By Cancro29. It supports ESP8266. For now it supports English,Indonesian, and custom language.
The default password for "NETHERCAP" is "deauther".
- Evil-Twin : Customizable HTML page with a custom fake "loading/reconnecting" page.
- Deauth All : Deauth all targets in range.
- Multi-target deauth : Choose more than one target to deauth.
- True Deauth : Constantly deauth nearby networks in real-time.
- Rogue AP : Create a fake login page that asks for user's credential.
- Auto-resume : Continue operation even after the module gets restarted unintentionally.
- Monitor Page : Monitor and record status and events.
- Logger : Record events that happened during usage.
- Customizable : Set your own settings and it will stay persistent.
- Sniffing : Count how many users connected to an AP and how much network activities they performed.
- Extender : Connect an AP and then extend it using different AP name.
- File Manager : Upload, choose custom HTML page, or flash firmware in one menu.
- HTML Menu : Choose a custom HTML. You will get the preview so you can see what the target will see.
- Local Remote. Control another NETHERCAP device to make them work together.
- OLED support : Display real-time status. Support SSD1306 and SH1106.
- Beacon Spam (Available Only On nc281)
- Extender MAC Randomization (Available Only On nc281)
- Signal indicator for selected target (OLED) (Available Only On nc281)
- Flash Firmware to ESP8266-based Board With Zeronetfix
- Connect to "NETHERCAP" Access Point.
- read the instructions first.
- Wait for captive portal to appear or access 192.168.4.1 on your browser.