Developed by 0x0806 | The Ultimate Dual-Platform WiFi & BLE Penetration Testing Tool
The most advanced ESP8266/ESP32 security testing platform available. This comprehensive suite combines cutting-edge WiFi attack vectors, Bluetooth Low Energy (BLE) capabilities, dual-band operations, and enhanced processing power - all unified in a single Arduino sketch for maximum portability and professional deployment.
π¨ FOR AUTHORIZED SECURITY TESTING ONLY π¨
β’ Use ONLY on networks you own or have explicit written authorization to test
β’ Unauthorized access to computer networks is ILLEGAL in most jurisdictions
β’ Users are SOLELY responsible for compliance with local, state, and federal laws
β’ This tool is designed for legitimate security research and network hardening
β’ The developers assume NO LIABILITY for misuse or illegal activities
β’ Always obtain proper authorization before conducting security assessments
By using this software, you acknowledge understanding and acceptance of these terms.
- 40+ Advanced Attack Vectors: Most comprehensive dual-platform attack suite
- Universal Compatibility: Works on both ESP8266 and ESP32 platforms
- Dual-Band WiFi Support: 2.4GHz + 5GHz operations (ESP32 only)
- BLE Attack Capabilities: Bluetooth Low Energy security testing (ESP32 only)
- AI-Powered Target Selection: Intelligent network prioritization
- Real-Time Packet Forensics: Deep packet inspection and analysis
- Modern Web Interface: Responsive design with dark mode
- Zero-Configuration Deployment: Auto-detects platform and configures
- Memory: 4MB flash, optimized 80KB RAM usage
- WiFi: 2.4GHz only, channels 1-14
- Attack Rate: Up to 1000 packets/second
- Range: 50-150 meters typical
- Memory: 4MB+ flash, 520KB RAM available
- WiFi: Dual-band 2.4GHz + 5GHz support
- BLE: Bluetooth Low Energy 4.2/5.0
- Attack Rate: Up to 2000 packets/second
- Range: 100-300 meters typical
- Dual-Core: Enhanced processing power
ββ Deauthentication Attacks
ββ Beacon Frame Flooding
ββ Probe Request Storms
ββ Evil Twin Operations
ββ PMKID Capture
ββ Karma Attacks
ββ Handshake Capture
ββ Packet Monitoring
ββ Channel Hopping
ββ MAC Randomization
ββ Amplified Attacks
ββ Persistent Disruption
ββ BLE Beacon Flooding
ββ BLE Spam Attacks
ββ Device Enumeration
ββ Connection Hijacking
ββ Advertisement Spoofing
ββ Service Discovery
ββ Characteristic Fuzzing
ββ Proximity Attacks
ββ Pairing Exploitation
ββ Protocol Analysis
ββ Simultaneous 2.4GHz/5GHz Monitoring
ββ Cross-Band Attack Coordination
ββ Enhanced Network Discovery
ββ Wider Target Coverage
ββ Interference Analysis
ββ Channel Utilization Mapping
ββ Band-Specific Vulnerabilities
ββ Comprehensive Surveillance
ββ Passive Network Discovery
ββ Active Station Enumeration
ββ Hidden SSID Detection
ββ Encryption Analysis
ββ Signal Strength Mapping
ββ Vendor Fingerprinting
ββ Temporal Attack Windows
ββ Protocol Identification
ββ Security Posture Assessment
ββ Vulnerability Scanning
βββββββββββββββββββββββββββββββββββββββ
β Web Interface (Universal) β
βββββββββββββββββββββββββββββββββββββββ€
β Attack Engine (Platform) β
βββββββββββββββββββββββββββββββββββββββ€
β WiFi Module β BLE Module β
β (ESP8266/32) β (ESP32 only) β
βββββββββββββββββββββββββββββββββββββββ€
β Packet Processing Core β
βββββββββββββββββββββββββββββββββββββββ€
β Hardware Abstraction Layer β
βββββββββββββββββββββββββββββββββββββββ
Platform Detection β Network/BLE Scan β Target Selection β
Attack Vector Configuration β Multi-Channel Execution β
Real-Time Monitoring β Performance Analysis β Reporting
| Board | Flash | RAM | WiFi | BLE | Recommended |
|---|---|---|---|---|---|
| NodeMCU v1.0 | 4MB | 80KB | 2.4GHz | β | βββββ |
| Wemos D1 Mini | 4MB | 80KB | 2.4GHz | β | ββββ |
| ESP-12E/F | 4MB | 80KB | 2.4GHz | β | βββ |
| Generic ESP8266 | 1-4MB | 80KB | 2.4GHz | β | ββ |
| Board | Flash | RAM | WiFi | BLE | Recommended |
|---|---|---|---|---|---|
| ESP32 DevKit v1 | 4MB | 520KB | 2.4/5GHz | β | βββββ |
| ESP32-WROOM-32 | 4MB | 520KB | 2.4/5GHz | β | βββββ |
| ESP32-S3 | 8MB | 512KB | 2.4/5GHz | β | βββββ |
| ESP32-C3 | 4MB | 400KB | 2.4GHz | β | ββββ |
| TTGO T-Display | 4MB | 520KB | 2.4/5GHz | β | ββββ |
ESP8266: 3.3V @ 250mA+ (peak 350mA)
ESP32: 3.3V @ 500mA+ (peak 800mA)
- Arduino IDE 2.x or 1.8.19+
- ESP8266 Core 3.1.2+ or ESP32 Core 2.0.14+
- USB drivers for your board
- Stable power supply
Board Manager URL:
http://arduino.esp8266.com/stable/package_esp8266com_index.json
Search: "esp8266"
Install: ESP8266 Community latest
Board Manager URL:
https://raw.githubusercontent.com/espressif/arduino-esp32/gh-pages/package_esp32_index.json
Search: "esp32"
Install: ESP32 Community latest
Board: "NodeMCU 1.0 (ESP-12E Module)"
Flash Size: "4MB (FS:2MB OTA:~1019KB)"
CPU Frequency: "80MHz"
Flash Mode: "DIO"
Flash Frequency: "40MHz"
Upload Speed: "921600"
Debug Level: "None"
Board: "ESP32 Dev Module"
Flash Size: "4MB (32Mb)"
Partition Scheme: "Default 4MB with spiffs"
CPU Frequency: "240MHz"
Flash Mode: "QIO"
Flash Frequency: "80MHz"
Upload Speed: "921600"
Core Debug Level: "None"
1. Connect board via USB
2. Select correct board and port
3. Open ESP_Arsenal_Ultimate.ino
4. Verify compilation (Ctrl+R)
5. Upload to board (Ctrl+U)
6. Monitor serial output (Ctrl+Shift+M)
1. Power on device
2. Wait for LED indicator (Platform detection)
3. Scan for "ESP-Arsenal-XXXXXX" network
4. Connect with password: "esp-arsenal"
5. Open browser β 192.168.4.1
6. Platform auto-detected and configured
1. Access web interface
2. Verify platform detection (ESP8266/ESP32)
3. Configure attack parameters
4. Set custom network lists
5. Enable desired modules (WiFi/BLE)
6. Run system diagnostics
1. Navigate to Scanner tab
2. Select scan type (WiFi/BLE/Both)
3. Click "Start Scan"
4. Review discovered targets
5. Select target and attack vector
6. Configure attack parameters
7. Execute attack and monitor results
βββββββββββββββββββββββββββββββββββββββ
β π Scanner β βοΈ Attacks β π‘ Beacon β
β π± BLE β ποΈ Monitor β π Stats β
β βοΈ Settings β π§ Tools β π Logs β
βββββββββββββββββββββββββββββββββββββββ
- Dark Mode Design: Professional cybersecurity aesthetic
- Real-Time Updates: Live WebSocket connections
- Platform Awareness: Adapts to ESP8266/ESP32 capabilities
- Mobile Responsive: Optimized for all screen sizes
- Visual Feedback: Immediate response indicators
- Progress Tracking: Real-time attack progress
- Multi-Tab Support: Concurrent operations
ββ WiFi Scanner (2.4GHz only)
ββ WiFi Attacks (Standard suite)
ββ Network Monitor
ββ Statistics Dashboard
ββ Basic Settings
ββ System Information
ββ WiFi Scanner (2.4GHz + 5GHz)
ββ WiFi Attacks (Enhanced suite)
ββ BLE Scanner & Attacks
ββ Dual-Band Monitor
ββ Advanced Statistics
ββ Extended Settings
ββ System Diagnostics
// ESP8266 Optimized Settings
#define MAX_NETWORKS 50
#define MAX_STATIONS 50
#define MAX_SSIDS 25
#define ATTACK_INTENSITY 500
#define MEMORY_OPTIMIZATION true// ESP32 Enhanced Settings
#define MAX_NETWORKS 200
#define MAX_STATIONS 200
#define MAX_SSIDS 100
#define ATTACK_INTENSITY 1000
#define DUAL_BAND_SUPPORT true
#define BLE_ENABLED true// Access Point Configuration
#define AP_SSID_PREFIX "ESP-Arsenal-"
#define AP_PASSWORD "esp-arsenal"
#define AP_CHANNEL 6
#define AP_HIDDEN false
#define AP_MAX_CLIENTS 8// Configurable Attack Settings
#define DEAUTH_PACKETS_PER_SECOND 100
#define BEACON_FLOOD_INTERVAL 100
#define PROBE_REQUEST_DELAY 50
#define CHANNEL_HOP_INTERVAL 250
#define BLE_SPAM_INTERVAL 100 // ESP32 only| Feature | ESP8266 | ESP32 | Improvement |
|---|---|---|---|
| CPU Speed | 80MHz | 240MHz | 3x faster |
| Memory | 80KB | 520KB | 6.5x more |
| WiFi Bands | 2.4GHz | 2.4+5GHz | Dual-band |
| BLE Support | β | β | New capability |
| Attack Rate | 1000 PPS | 2000 PPS | 2x faster |
| Range | 150m | 300m | 2x further |
| Attack Type | ESP8266 | ESP32 | Target Success |
|---|---|---|---|
| Deauthentication | 95% | 98% | WPA/WPA2 |
| Beacon Flooding | 100% | 100% | All targets |
| Probe Storms | 90% | 95% | Most targets |
| Evil Twin | 85% | 92% | Unaware users |
| BLE Spam | N/A | 95% | BLE devices |
// Automatic platform detection
void detectPlatform() {
#ifdef ESP32
platform = PLATFORM_ESP32;
enableDualBand();
enableBLE();
#else
platform = PLATFORM_ESP8266;
enableBasicWiFi();
#endif
}// Enhanced dual-band support
void initDualBand() {
// Configure 2.4GHz radio
esp_wifi_set_bandwidth(WIFI_IF_STA, WIFI_BW_HT20);
// Configure 5GHz radio
esp_wifi_set_bandwidth(WIFI_IF_AP, WIFI_BW_HT40);
// Enable simultaneous operation
esp_wifi_set_mode(WIFI_MODE_APSTA);
}// BLE attack implementation
class BLEAttacker {
void spamAttack();
void beaconFlood();
void deviceEnum();
void proximityAttack();
void pairingExploit();
};β
Educational purposes only
β
Authorized network testing
β
Security research
β
Penetration testing
β
Vulnerability assessment
β
Network hardening
β
Compliance auditing
β Unauthorized access
β Malicious disruption
β Privacy violations
β Commercial exploitation
β Illegal surveillance
β Criminal activities
β Harassment
β¨ New Features:
ββ Universal ESP8266/ESP32 support
ββ Dual-band WiFi operations
ββ BLE attack capabilities
ββ Enhanced web interface
ββ Improved performance
ββ Better stability
ββ Extended compatibility
v6.0.0-Ultimate (Current) - Universal platform support
v5.0.0-Ultimate - Advanced ESP8266 features
v4.0.0-Advanced - Enhanced algorithms
v3.0.0-Professional - Web interface overhaul
v2.0.0-Enhanced - Multi-channel support
v1.0.0-Initial - Basic deauth functionality
Issue: Wrong platform detected
Solution: Check #define statements, verify board selection
Issue: Missing features
Solution: Confirm ESP32 for BLE/dual-band features
Error: BLE libraries not found
Solution: Install ESP32 core, verify board selection
Error: Memory allocation failed
Solution: Reduce MAX_NETWORKS/MAX_STATIONS values
Issue: Frequent crashes
Solution: Check power supply, reduce attack intensity
Issue: Poor performance
Solution: Optimize settings for your platform
// Built-in diagnostics
void systemDiagnostics() {
Serial.printf("Platform: %s\n", getPlatformName());
Serial.printf("Free Heap: %u bytes\n", ESP.getFreeHeap());
Serial.printf("CPU Freq: %u MHz\n", ESP.getCpuFreqMHz());
Serial.printf("Flash Size: %u bytes\n", ESP.getFlashChipSize());
#ifdef ESP32
Serial.printf("BLE Status: %s\n", BLE.isEnabled() ? "ON" : "OFF");
Serial.printf("Dual-Band: %s\n", isDualBandEnabled() ? "ON" : "OFF");
#endif
}- GitHub Issues: Bug reports and feature requests
- Documentation: Comprehensive guides and tutorials
- Community Forum: User discussions and support
- Security Reports: Responsible disclosure process
1. Fork repository
2. Create feature branch
3. Implement changes
4. Test on both platforms
5. Submit pull request
6. Code review process
- Universal compatibility (ESP8266/ESP32)
- Clean, documented code
- Comprehensive testing
- Security best practices
- Performance optimization
Copyright (c) 2025 0x0806
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
- 0x0806: Lead developer and architect
- Community Contributors: Feature development and testing
- Security Researchers: Vulnerability research and methodology
- Stefan Kremser: Original ESP8266 Deauther inspiration
- Espressif Systems: ESP8266/ESP32 platform development
- Arduino Community: Development tools and libraries
- OWASP Foundation: Security testing standards
- Open Source Community: Collaborative development
- GitHub: @0x0806
- Email: security@0x0806.dev
- Security Reports: security@0x0806.dev
- Security Consulting: Enterprise penetration testing
- Custom Development: Specialized security tools
- Training: WiFi/BLE security workshops
- Support: Priority technical assistance
β‘ Universal ESP8266/ESP32 compatibility
β‘ 40+ advanced attack vectors
β‘ Dual-band WiFi + BLE support
β‘ Modern responsive web interface
β‘ Professional security testing tool
β‘ Open source with MIT license
β‘ Active development and support
- ESP8266: Cost-effective, proven reliability
- ESP32: Enhanced performance, dual-band, BLE
- Universal: Single codebase, automatic detection
- Scalable: Adapts to platform capabilities
β‘ ESP Arsenal Ultimate v6.0.0 - The Universal WiFi & BLE Security Testing Platform
Empowering security professionals with cutting-edge tools for legitimate security research and network assessment. Platform-agnostic design for maximum compatibility and performance.
Last Updated: January 2025 | Version 6.0.0-Ultimate | Document Revision 2.0
Β© 2024-2025 0x0806. All rights reserved. For authorized security testing only.