It provides some common functionality that is commonly used in Wi-Fi attacks and makes implementing new attacks a bit simpler
- ESP-IDF 4.1
(commit 5ef1b390026270503634ac3ec9f1ec2e364e23b2)
(ESP32) - ESP-IDF 4.4.8 Release (ESP32C3 , ESP32)
idf.py build
idf.py -p [PORT] flash
- ESPTOOL.PY (Require python)
esptool.py -p [PORT] -b 115200 --after hard_reset write_flash --flash_mode dio --flash_freq 40m --flash_size detect 0x8000 build/partition_table/partition-table.bin 0x1000 build/bootloader/bootloader.bin 0x10000 build/esp32-wifi-penetration-tool.bin
This project set default support board is ESP32C3
- Change board to other board Must match ESP-IDF version
- ESP-IDF 4.1
(commit 5ef1b390026270503634ac3ec9f1ec2e364e23b2)
(ESP32)- ESP-IDF 4.4.8 Release (ESP32C3 , ESP32)
idf.py set-target [BOARD_NAME]
idf.py build
- After flashing connect the the ESP32 via Wi-Fi
- Default SSID
NotFlippedZero
and PASSWORDzer0admin
- After connected to the ESP32 go to your browser then type
192.168.4.1
(http) to access the pannel - Start using the tool
- ESP-IDF 4.1
(commit 5ef1b390026270503634ac3ec9f1ec2e364e23b2)
idf.py menuconfig
To config the wifi components go to the Component config --> Wi-Fi Controller