-
Notifications
You must be signed in to change notification settings - Fork 1
Home
dfyR433 edited this page Mar 6, 2026
·
9 revisions
-
ESP32 Development Board
- Recommended: ESP32-WROOM-32 or ESP32-S3 (more RAM)
- Alternative: ESP32-S2 or ESP32-C3 (RISC-V variant)
-
SD Card Reader Module (Optional)
- VCC: 5v or 3.3v
- GND: GND
- MISO: GPIO 19
- MOSI: GPIO 23
- SCK: GPIO 18
- CS: GPIO 5
| Board Model | RAM | Flash | Recommended |
|---|---|---|---|
| ESP32-WROOM-32 | 520KB | 4MB | ✓✓✓ |
| ESP32-S2 | 320KB | 4MB | ✓ |
| ESP32-S3 | 512KB + 2MB PSRAM | 8-16MB | ✓✓✓✓ |
| ESP32-C3 | 400KB | 4MB | ✓✓ |
- Connect ESP32 via USB
- Open Browser to: https://espressif.github.io/esptool-js/ or https://esptool.spacehuhn.com/
- Click "Connect" → Select your ESP32
- Download Firmware: bootloader.bin & Antifi.bin & partitions.bin
-
Drag & Drop the
.binfiles into the flasher -
Flash Address:
0x1000&0x10000&0x8000 - Click "Erase"
- Click "Program"
╔══════════════════════════════════════════════════════════════════════════════════╗
║ ANTIFI COMMAND HELP ║
╠══════════════════════════════════════════════════════════════════════════════════╣
║ SNIFFING: ║
║ sniff -c <ch || all> Sniff WiFi on all channels or specific channel ║
║ ║
║ PACKET INJECTION: ║
║ inject<n> -i <hex> -c <ch> -p <rate> -m <max|non> -r <dbm> ║
║ -i: Packet data in hex (space-separated bytes) ║
║ -ch: Channel 1-14 ║
║ -p: Packets per second ║
║ -m: Max packets or 'non' for unlimited ║
║ -r: Tx power in dBm ║
║ ║
║ SCANNING: ║
║ scan -t <ap || sta> Scan for WiFi networks or clients ║
║ ║
║ BEACON ATTACK: ║
║ beacon -s Start beacon spam attack ║
║ ║
║ DEAUTH ATTACK: ║
║ deauth -s <src mac> -t <tgt mac> -c <channel> -p <pps> ║
║ ║
║ CAPTIVE PORTAL: ║
║ captive_portal <ssid> <pass> <type> ║
║ Types: wifi, google, microsoft, apple, facebook ║
║ ║
║ FILESYSTEM / SD: ║
║ sd_info Show SD card information (type/size/usage) ║
║ sd_ls [opts] [path] List files (opts: -h human, -r recursive, ║
║ -e <ext> filter by extension) ║
║ sd_tree [opts] [path] Show ASCII tree (opts: -h human, -d <depth>) ║
║ sd_rm [-r] [-y] <path> Remove file or directory. ║
║ -r : recursive delete (requires -y to execute) ║
║ -y : confirm & perform deletes when -r used ║
║ sd_rmdir <path> Remove empty directory only ║
║ ║
║ POWER FILES (utility): ║
║ sd_du [-h] [path] Disk usage (recursive). -h for human readable ║
║ sd_cat <file> Print small text file to serial (capped) ║
║ sd_mv [-f] <src> <dst> Move/rename (use -f to overwrite) ║
║ sd_cp [-f] <src> <dst> Copy file (use -f to overwrite) ║
║ sd_head [-n <lines>] <file> Print first N lines (default 10) ║
║ sd_tail [-n <lines>] <file> Print last N lines (default 10), safe cap ║
║ sd_find [opts] <substr|ext> Find files by substring or -e <ext> (recursive) ║
║ ║
║ MANAGEMENT: ║
║ stop Stop all attacks/portals/scans ║
║ stop -p <name|all> Stop specific injector or all injectors ║
║ creds Show captured credentials ║
║ clear Clear all credentials and injectors ║
║ version / v Show firmware version ║
║ help / ? Show help menu ║
║ ║
╚══════════════════════════════════════════════════════════════════════════════════╝python serial_terminal.py -p <port>- SAE Attacks: SAE security analysis
- WPA3 Support: Enhanced security protocol support
- Automated Reporting: Generate PDF reports of findings