A distributed, privacy‑focused cyber security platform built on low‑cost ESP‑based devices. Each node operates as a headless Agent, remotely controlled by a mobile Commander App. Together, they form a flexible and cooperative system for wireless network analysis and privacy defense — fully interoperable across both ESP8266 and ESP32 hardware.
Project Synapse introduces a scalable architecture where multiple low‑cost microcontroller boards work together to analyze, test, and protect wireless networks in a controlled and ethical manner.
- Commander: A mobile control application managing all Agents remotely.
- Agents: Headless devices (ESP8266 / ESP32) that execute assigned network operations autonomously.
- Control Network: A secure Wi‑Fi network established by the Commander to coordinate communications.
Agents connect, receive REST‑based commands, temporarily switch into test mode, execute their tasks (e.g., Wi‑Fi scans or simulations), and then reconnect to report results.
- 🛰️ Distributed Operation: Multiple Agents performing tasks simultaneously under one Commander.
- 🔐 Privacy Defense Tools: Network activity simulations to test resilience against passive tracking or metadata collection.
- 🌐 REST API Control: Simple command‑based communication for easy mobile or desktop integration.
- 💤 Power Efficiency: Headless design with deep sleep support for extended field use.
- ⚡ Interoperability: Seamless collaboration between ESP8266 and ESP32 devices — no hardware modification required.
- 🧩 Scalability: Easily expand the system with new Agents for larger operations or experiments.
- Commander App creates a protected Wi‑Fi network.
- Agents connect and register themselves.
- Commander sends REST commands for tasks (e.g., scanning or simulation).
- Agents temporarily switch to analysis mode, perform the task, and store results.
- Agents reconnect to report results and await new commands.
This architecture ensures high stability and avoids radio conflicts common in dual‑mode setups.
Large retail centers often use Wi‑Fi probe request tracking to analyze visitor behavior. Project Synapse can conceptually generate controlled “noise” to test and evaluate such systems, ensuring they cannot easily correlate user identities.
By simulating randomized probe activity, Synapse demonstrates how network privacy defenses can protect users against passive location tracking.
Note: The following modes are for controlled research, simulation, or laboratory testing only. They are not active in the public firmware.
- Deauthentication Simulation – Testing network resilience by simulating temporary disconnect waves.
- Beacon & Probe Flood Simulation – Generating randomized SSID broadcast traffic for privacy stress‑tests.
- Snooping / Passive Capture – Capturing and analyzing nearby signals for research purposes.
All modes are disabled by default and require explicit activation in test environments with authorization.
Important: The videos/images referenced here are illustrative concept clips (icons/placeholders). They do not represent a finished or publicly deployable system — they are planned examples showing how features could behave in a controlled test setup. Use of disruptive modes is subject to legal and ethical restrictions as described above.
|
Summary: Illustrative clip showing multiple Agents simultaneously monitoring multiple networks and relaying telemetry to the Commander. Demonstrates the intended multi‑channel sensing design. |
|
|
Summary: Placeholder clip showing ESP8266 and ESP32 devices exchanging data and coordinating tasks — proving cross‑generation compatibility purely via software. |
|
- All test and simulation modes are disabled by default.
- Any active testing must be done in isolated lab environments with explicit authorization.
- The project aims to promote education, research, and responsible experimentation — never disruption.
MIT License — for educational and ethical research use only.



