A stealthy captive portal framework for ESP32-2432S022 (2.2" CYD display)
Harvest credentials through deceptive WiFi portals - For educational/pen-testing purposes only
WiFiSpider is an ESP32-based rogue access point framework designed for security researchers to demonstrate phishing risks in public WiFi networks. Built specifically for the 2.2" CYD ESP32-2432S022 touch display, it combines:
- Captive portal interception
- Credential harvesting
- On-device display logging
- Evil Portal Engine
- Auto-redirect all HTTP requests to spoofed login pages
- DNS hijacking for persistent captive portal behavior
- Customizable HTML templates (Google, Facebook, etc.)
- 2.2" CYD Touchscreen UI
- Real-time victim connection monitoring
- Credential display scrolling
- Basic touch controls for operation
Tested ONLY on:
ESP32-2432S022 (2.2" CYD display)
Required Components:
- MicroSD card module (later on)
- External Antenna (optional, needs soldering)
-
Hardware Setup
CYD Display -> ESP32
-
Upload Sketch
- Select
ESP32 Dev Module
in Arduino IDE
- Select
-
Operation
- Power on device
- View credentials on display
- Add multi-portal template support
- Implement SD Card File Selection
- Touchscreen calibration utility
- Basic captive portal (current)
- OTA firmware updates
This tool is intended for legal security research only. Usage for attacking targets without prior mutual consent is illegal. Developers assume no liability for misuse.
Open to PRs for:
- SD Card Support
- Better UI/UX
Evil Portal Code
- Atomic by Axion Security
Core Logic for Evil Portal
Special Thanks
- Zynth9999: Recommend me the UI library.
GNU GPLv3 - See LICENSE for details