Skip to content

KernelPhantom-010/TRUSTED-NET-Active-Wi-Fi-Evil-Twin-Detection-Tool

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 

Repository files navigation

Logo

TRUSTED NET – Active Wi-Fi Evil Twin Detection Tool for people who want to know, what they connect to.

A brief description of what this project does and who it's for

What is it?

Trusted NET is an active wireless network security scanner designed to detect Evil Twin attacks.

It works by continuously scanning nearby Wi-Fi networks—recording details like SSID (network name), BSSID (access point MAC address), signal strength (RSSI), and first-seen timestamps—and comparing them against a local database of trusted networks. When a network appears that mimics a known SSID but has a different BSSID or behaves suspiciously, the tool flags it as a potential Evil Twin, alerting the user in real time through its graphical interface.

Built with C++ for performance-critical scanning and packet processing, and C# for an intuitive user interface, Trusted NET is useful for both security professionals conducting red team engagements or penetration tests, and everyday users who want to protect their home or small business networks from Wi-Fi–based impersonation attacks. All scanning happens locally, ensuring privacy and good usability. We guarantee 90% of successful detections. And of course, we don't store or use your passwords in any way. That's why we made it public of course.

Used By

This project got developed for the following types of people:

  • Blue/Red-Teamers
  • Malware Analystics
  • But also private people who just don't want to get fooled by a hacker at the caffee

Installation

Installing DaFuzz

  No long installation instructions here. Simply double click
  the .exe-File and don't close it. If you want end the program, don't forget to close the 'consola_trstnet.exe' component in the task-manager.
  And yes, I'm still working on it to close automatically.. calm down! 

Usage and Tips

1. After running the software, just click on the button 'Rescan Network'. The other buttons are reserved for later updates, after a little bit more of attention to our project we could think about editing the other buttons for visibility of a website, where we will as well, demonstrate our software.
2. That's it. But of course, in cases you are in a restaurant and the software actually finds something, don't be worried. 
Simply be sure to NOT connect to that network. AND!!!!! NEVER EVER 
(because our software is not concepted for such easy names as 'Free Wifi')
CONNECT TO AN UNBRANDED NETWORK AS 'Free Wifi' or stuff like that. An legitimite restaurant would (almost) ALWAYS 
put add their name into their WiFi-SSID, and legitimate verification 
to their WiFi-Portal, and NEVER verification-methods
like Google-Login portals (as an example).

Screenshots

App Screenshot

Evil Twin - Detection (Demonstrated with Bruce-Firmaware of the M5Stick Plus2)

App Screenshot

(Local) Database-file with stored information about the network

🚀 About Me

My name is Fabio Baensch, “full-of-age” in the world of cybersecurity. Currently attending a high-school in Brandenburg, I dedicate most of my free time to exploring and building tools that dive deep into system security—especially Windows internals, binary analysis, and defensive/offensive research.

While I may not be the biggest fan of the web (unless it’s for reading security write-ups or downloading new reverse-engineering tools), I’m completely at home working with disassemblers, writing low-level code, and creating projects that dissect how software and systems really work—from fuzzing and DLL injection to kernel object manipulation and network attack simulations.

My portfolio reflects my hands-on approach: I’ve tackled CrackMes, built custom scanners, implemented DKOM attack vectors, and even designed tools to detect Evil Twin attacks—all in controlled lab environments. I enjoy translating theoretical security concepts into working code, and I’m always looking for the next challenge that helps me better understand how things work—and how they can be broken.

Whether it's breaking down a binary in IDA Pro, writing a Python script to decode XOR obfuscation, or fuzzing a Windows service for flaws, I’m driven by the curiosity to learn, build, and contribute meaningfully to the field of cybersecurity.

🛠 Skills

C++, (NOT Objective) C, Python and C#

About

TRUSTED NET is a security tool that detects Evil Twin attacks by comparing discovered Wi-Fi networks with stored network profiles.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors