-
Notifications
You must be signed in to change notification settings - Fork 197
Features
The ESP32-DIV is packed with tools for wireless manipulation and analysis, organized into four main menus: Wi-Fi, Bluetooth, 2.4GHz, and Sub-GHz. Each menu offers unique features for testing, jamming, and exploring wireless protocols. Below is a detailed look at what the ESP32-DIV can do.
-
Packet Monitor
Visualize live Wi-Fi traffic across all 14 channels with a real-time waterfall graph. Perfect for monitoring network activity and analyzing the wireless environment. -
Beacon Spammer
Flood the airwaves with fake Wi-Fi access points (beacon frames). Choose to target specific access points with custom names or generate random fake networks to disrupt connections or trick devices. -
Deauth Detector
Scan for deauthentication attacks and other suspicious activities. Originally designed for deauth detection, it now serves as a general-purpose threat detection tool. -
Wi-Fi Scanner
List nearby Wi-Fi networks with detailed information (e.g., SSID, channel, signal strength). Ideal for network analysis and security assessments. -
Wi-Fi Deauthentication Attack
Scan for nearby Wi-Fi networks, select a target access point (AP), and send deauthentication frames to disrupt client connections. Features an intuitive touchscreen interface for network selection and attack management, making it a powerful tool for network security testing and demonstrations. -
Captive Portal
Create a Wi-Fi access point (AP) that captures user credentials via a login page. Includes a user-friendly touchscreen interface for configuration, credential management, and attack control, ideal for network testing and security demonstrations.
-
BLE Jammer
Flood Bluetooth Low Energy (BLE) advertising channels with noise to disrupt device discovery and connections. Also supports jamming classic Bluetooth channels. -
BLE Spoofer
Mimic real BLE devices by sending fake advertising packets. Impersonate specific devices to test responses or perform spoofing operations. -
Sour Apple
Target Apple devices by exploiting BLE features like AirDrop and Continuity. Spoof Apple BLE advertisements to trigger unintended behaviors or potential data leaks. -
BLE Scanner
Detect nearby BLE devices, including hidden ones, with detailed information on each. Great for analysis and security research. -
BLE Sniffer
Monitor and display nearby BLE and Classic Bluetooth devices on the TFT screen. Detect suspicious activities like jamming, MAC spoofing, and beacon spoofing, with alerts for potential threats. Shows real-time device information, including MAC addresses and signal strength.
-
2.4GHz Scanner
Scan the entire 2.4GHz spectrum (128 channels) to detect Wi-Fi, Zigbee, and proprietary RF protocols. Useful for identifying non-standard wireless activity. -
Protokill
Jam wireless protocols on the 2.4GHz band, such as Zigbee and Wi-Fi. Perfect for stress-testing protocols or targeted jamming operations.
-
Replay Attack
Capture and replay Sub-GHz signals (e.g., door unlock commands) for unauthorized access. Features a real-time waterfall graph and stores signals for later use. -
Sub-GHz Jammer
Disrupt Sub-GHz devices like garage door openers, remote controls, and IoT sensors. Select specific frequencies or cycle through them automatically. -
Saved Profiles
Store and manage captured signals from Replay Attacks. Revisit, replay, or delete profiles as needed.
Explore these features with your ESP32-DIV! Check the Firmware Upload Guide to get started.
- Home
-
Introduction
Learn about the ESP32-DIV project and its evolution. -
Features
Explore Wi-Fi, Bluetooth, 2.4GHz, and Sub-GHz tools. -
Hardware
Details on the Main Board and Shield components. -
Schematics
Connection diagrams for ESP32 and modules. -
Firmware Upload Guide
Upload firmware via OTA, Flash Tool, or Arduino IDE. -
Contributing
How to contribute to the project.
Resources
Created by CiferTech for wireless enthusiasts!