> Welcome to the Chr0nicHacker Terminal
Youโve unlocked a secret zone reserved for digital rebels, free-thinkers, and elite terminal tacticians.
> Wi-Fi Hacking Lab
Capture WPA2 handshakes, perform deauth attacks, and analyze traffic with tools like airodump-ng
and aireplay-ng
.
- ๐ก ESP32 as a deauth device
- ๐ง Understanding handshake cracking
- ๐ฅ Caution: Educational use only
> Bluetooth Spoofing Toolkit
Use the ESP32 to spoof BLE beacons, scan and clone devices, and mimic Bluetooth accessories.
- ๐งฟ BLE MAC Spoofing
- ๐ฑ Clone keyboards, headphones, more
- โ ๏ธ Think ethical, act responsible
> Captive Portal Trap
Set up a fake access point and intercept connections. Demonstrate open Wi-Fi vulnerabilities.
- ๐ ESP32 Wi-Fi AP Mode
- ๐ณ๏ธ DNS redirection to phishing portal
- ๐ Login page capture demo
> Payloads & Recon Tools
Run BadUSB attacks, internal network scans, and Linux post-exploitation toolkits.
- ๐งจ Custom Rubber Ducky payloads
- ๐ Subnet scanning tools
- ๐ฆ Linux post-exploitation toolkit
> Password List Mastery
Learn how to combine, mutate, and optimize password lists using awk
, sort
, Hydra
, Medusa
and more.
- ๐ง Custom list creation
- ๐งช Mutations for bruteforce
- ๐ฃ Hydra, Hashcat, Medusa examples
> Network Enumeration Like a Boss
Map your network with nmap
, netdiscover
, and arp-scan
. Find hidden devices and rogue access points.
- ๐ Subnet discovery
- ๐ฏ Spot rogue devices
- ๐ก๏ธ Recon baselining
> Hidden Networks and Evil Twin Attacks
Unmask hidden SSIDs, build Evil Twin APs, and defend against Wi-Fi auto-connect exploitation.
- ๐ญ Fake AP setups
- ๐ก Karma attacks
- ๐ก๏ธ Protection strategies