![]() |
After 6 months of R&D and many fail, I pushed the limits of what’s possible on an ESP32. I'm glad to announce that Evil-M5Project is now able to act like the famous program Responder directly on an ESP32 LLMNR/NBNS poisoning, SMBv1-v2 challenge/response, and NTLMv2 hash capture all visualized in real time ! And tested on fully patched Windows 11 ! --- π₯ What’s New in v1.4.1? • π― **LLMNR/NBNS Spoofing** Instantly answer NetBIOS and link-local lookups with your Cardputer’s IP, forcing Windows hosts to leak credentials. • π **SMBv1 & SMBv2 NTLMv2 Challenge** Wait for spoofed SMB connections to initiate NTLMv2 challenge/response, capturing hashes from fully patched Windows 11 machines. • π **Radar-Style Visualization & Stats Dashboard** Live radar pulses on detection with a live stats view showing last username/domain, device IP/hostname, and total captures. • πΎ **Hash Logging** All NTLMv2 hashes auto-saved to `ntlm_hashes.txt` (ready for Hashcat). • π ️ **Under-the-Hood Fixes & Stability Improvements** --- ➡️ **Get it now on GitHub:** https://github.com/7h30th3r0n3/Evil-M5Project Available in the Binary folder & via M5Burner. --- π Enjoy !!! π₯³π₯ [link] [comments] |
from hacking: security in practice https://ift.tt/pN1sH6T
Comments
Post a Comment