Skip to content

Network Hijacking

7h30th3r0n3 edited this page Jan 20, 2025 · 2 revisions

Perform the entire process interactively with automated guidance.

Automated Workflow:

  • With a single command, Evil-Project executes the full attack process:
    • DHCP Starvation
    • Rogue DHCP setup
    • Captive portal initialization
    • Switching DNS and spoofing
  • Interactive guidance is provided at each step for demonstration if you want.

Here the demo video :

Demo Video
Clone this wiki locally