TRUSTED NET – Active Wi-Fi Evil Twin Detection Tool for people who want to know, what they connect to.
A brief description of what this project does and who it's for
Trusted NET is an active wireless network security scanner designed to detect Evil Twin attacks.
It works by continuously scanning nearby Wi-Fi networks—recording details like SSID (network name), BSSID (access point MAC address), signal strength (RSSI), and first-seen timestamps—and comparing them against a local database of trusted networks. When a network appears that mimics a known SSID but has a different BSSID or behaves suspiciously, the tool flags it as a potential Evil Twin, alerting the user in real time through its graphical interface.
Built with C++ for performance-critical scanning and packet processing, and C# for an intuitive user interface, Trusted NET is useful for both security professionals conducting red team engagements or penetration tests, and everyday users who want to protect their home or small business networks from Wi-Fi–based impersonation attacks. All scanning happens locally, ensuring privacy and good usability. We guarantee 90% of successful detections. And of course, we don't store or use your passwords in any way. That's why we made it public of course.
This project got developed for the following types of people:
- Blue/Red-Teamers
- Malware Analystics
- But also private people who just don't want to get fooled by a hacker at the caffee
Installing DaFuzz
No long installation instructions here. Simply double click
the .exe-File and don't close it. If you want end the program, don't forget to close the 'consola_trstnet.exe' component in the task-manager.
And yes, I'm still working on it to close automatically.. calm down! 1. After running the software, just click on the button 'Rescan Network'. The other buttons are reserved for later updates, after a little bit more of attention to our project we could think about editing the other buttons for visibility of a website, where we will as well, demonstrate our software.
2. That's it. But of course, in cases you are in a restaurant and the software actually finds something, don't be worried.
Simply be sure to NOT connect to that network. AND!!!!! NEVER EVER
(because our software is not concepted for such easy names as 'Free Wifi')
CONNECT TO AN UNBRANDED NETWORK AS 'Free Wifi' or stuff like that. An legitimite restaurant would (almost) ALWAYS
put add their name into their WiFi-SSID, and legitimate verification
to their WiFi-Portal, and NEVER verification-methods
like Google-Login portals (as an example).Evil Twin - Detection (Demonstrated with Bruce-Firmaware of the M5Stick Plus2)
(Local) Database-file with stored information about the network
My name is Fabio Baensch, “full-of-age” in the world of cybersecurity. Currently attending a high-school in Brandenburg, I dedicate most of my free time to exploring and building tools that dive deep into system security—especially Windows internals, binary analysis, and defensive/offensive research.
While I may not be the biggest fan of the web (unless it’s for reading security write-ups or downloading new reverse-engineering tools), I’m completely at home working with disassemblers, writing low-level code, and creating projects that dissect how software and systems really work—from fuzzing and DLL injection to kernel object manipulation and network attack simulations.
My portfolio reflects my hands-on approach: I’ve tackled CrackMes, built custom scanners, implemented DKOM attack vectors, and even designed tools to detect Evil Twin attacks—all in controlled lab environments. I enjoy translating theoretical security concepts into working code, and I’m always looking for the next challenge that helps me better understand how things work—and how they can be broken.
Whether it's breaking down a binary in IDA Pro, writing a Python script to decode XOR obfuscation, or fuzzing a Windows service for flaws, I’m driven by the curiosity to learn, build, and contribute meaningfully to the field of cybersecurity.
C++, (NOT Objective) C, Python and C#


