Releases: exploitagency/ESPloitV2
Version 2.5.2
Update documentation to include a link to the new ESPloit to Ducky Script converter tool I made based on the previous work done by NURRL(designed Dckuino.js for converting Ducky Script payloads to run on an Arduino).
Version 2.5.1
NOTE: This release also requires manually updating the 32u4 sketch!
Add a serial link to allow issuing commands from the 32u4 back to the ESP8266, this may be utilized more in future releases.
Add the ability to set an open network via serial for devices that have trouble connecting to a secured ESP8266 access point (rare cases). This makes it easier for the new users who experience this rare issue to get started using their device.
Refer to: https://github.com/exploitagency/ESPloitV2#resetting-to-default-configurationrecovering-device
Version 2.5.0
Integrate ESPortal WiFi Credential Harvester (Phisher)
Other minor optimizations
Version 2.4.4
Save wear on flash some
Prevent configuration file conflicts with other projects
Increase to maximum filename length for uploads
Version 2.4.3
Fix filename length bug
Previously filenames that contained too many characters were not uploaded, now the filenames will simply be truncated to fit under the max limit. This improves reliability of mass payload uploading and exfiltrating files using the HTTP server.
Version 2.4.2
Fix FTP access point mode
I forgot I had to modify the library to work
It is now fixed, please update your library as well for manually compiling!
Version 2.4.0
Add WiFi Based Exfiltration Methods
-HTTP
-FTP
Version 2.3.7
Fix delays, improve speed and reliability.
Version 2.3.6
Bug fix for running a payload on insertion.
Version 2.3.5
Attempting to streamline the upgrading process for future releases. Minor improvements to reliability and documentation. Upon all future upgrades the device will be reset to the default configuration. You will not lose any payloads that have been uploaded.