"Evil" Access Point / Captive Portal implementation for the M5Stack CoreS3. The M5 is nicely suited to this as it has a battery built in.
For educational purposes only :-)
- Change the
ssid
to whatever access point name you want to pretend to be - Change the contents of
html.h
to resemble the login screen for the service you wish to phish - Once someone connects to the AP and submits their credentials, they will be displayed on the screen and echo'd to the serial port.
It would be pretty easy to modify this to store to an SD card or something similar if you wanted to let it run for a long time.