Skip to content
dfyR433 edited this page Mar 6, 2026 · 9 revisions

Welcome to Project Wiki

Hardware Requirements

  1. ESP32 Development Board

    • Recommended: ESP32-WROOM-32 or ESP32-S3 (more RAM)
    • Alternative: ESP32-S2 or ESP32-C3 (RISC-V variant)
  2. SD Card Reader Module (Optional)

    • VCC: 5v or 3.3v
    • GND: GND
    • MISO: GPIO 19
    • MOSI: GPIO 23
    • SCK: GPIO 18
    • CS: GPIO 5

Board Compatibility

Board Model RAM Flash Recommended
ESP32-WROOM-32 520KB 4MB ✓✓✓
ESP32-S2 320KB 4MB
ESP32-S3 512KB + 2MB PSRAM 8-16MB ✓✓✓✓
ESP32-C3 400KB 4MB ✓✓

Installation & Setup

  1. Connect ESP32 via USB
  2. Open Browser to: https://espressif.github.io/esptool-js/ or https://esptool.spacehuhn.com/
  3. Click "Connect" → Select your ESP32
  4. Download Firmware: bootloader.bin & Antifi.bin & partitions.bin
  5. Drag & Drop the .bin files into the flasher
  6. Flash Address: 0x1000 & 0x10000 & 0x8000
  7. Click "Erase"
  8. Click "Program"

Command Reference

╔══════════════════════════════════════════════════════════════════════════════════╗
║                               ANTIFI COMMAND HELP                                ║
╠══════════════════════════════════════════════════════════════════════════════════╣
║ SNIFFING:                                                                        ║
║   sniff -c <ch || all>        Sniff WiFi on all channels or specific channel     ║
║                                                                                  ║
║ PACKET INJECTION:                                                                ║
║   inject<n> -i <hex> -c <ch> -p <rate> -m <max|non> -r <dbm>                     ║
║     -i: Packet data in hex (space-separated bytes)                               ║
║     -ch: Channel 1-14                                                            ║
║     -p: Packets per second                                                       ║
║     -m: Max packets or 'non' for unlimited                                       ║
║     -r: Tx power in dBm                                                          ║
║                                                                                  ║
║ SCANNING:                                                                        ║
║   scan -t <ap || sta>         Scan for WiFi networks or clients                  ║
║                                                                                  ║
║ BEACON ATTACK:                                                                   ║
║   beacon -s                    Start beacon spam attack                          ║
║                                                                                  ║
║ DEAUTH ATTACK:                                                                   ║
║   deauth -s <src mac> -t <tgt mac> -c <channel> -p <pps>                         ║
║                                                                                  ║
║ CAPTIVE PORTAL:                                                                  ║
║   captive_portal <ssid> <pass> <type>                                            ║
║     Types: wifi, google, microsoft, apple, facebook                              ║
║                                                                                  ║
║ FILESYSTEM / SD:                                                                 ║
║   sd_info                      Show SD card information (type/size/usage)        ║
║   sd_ls [opts] [path]          List files (opts: -h human, -r recursive,         ║
║                                 -e <ext> filter by extension)                    ║
║   sd_tree [opts] [path]        Show ASCII tree (opts: -h human, -d <depth>)      ║
║   sd_rm [-r] [-y] <path>       Remove file or directory.                         ║
║                                 -r : recursive delete (requires -y to execute)   ║
║                                 -y : confirm & perform deletes when -r used      ║
║   sd_rmdir <path>              Remove empty directory only                       ║
║                                                                                  ║
║ POWER FILES (utility):                                                           ║
║   sd_du [-h] [path]            Disk usage (recursive). -h for human readable     ║
║   sd_cat <file>                Print small text file to serial (capped)          ║
║   sd_mv [-f] <src> <dst>       Move/rename (use -f to overwrite)                 ║
║   sd_cp [-f] <src> <dst>       Copy file (use -f to overwrite)                   ║
║   sd_head [-n <lines>] <file>  Print first N lines (default 10)                  ║
║   sd_tail [-n <lines>] <file>  Print last N lines (default 10), safe cap         ║
║   sd_find [opts] <substr|ext>  Find files by substring or -e <ext> (recursive)   ║
║                                                                                  ║
║ MANAGEMENT:                                                                      ║
║   stop                        Stop all attacks/portals/scans                     ║
║   stop -p <name|all>          Stop specific injector or all injectors            ║
║   creds                       Show captured credentials                          ║
║   clear                       Clear all credentials and injectors                ║
║   version / v                 Show firmware version                              ║
║   help / ?                    Show help menu                                     ║
║                                                                                  ║
╚══════════════════════════════════════════════════════════════════════════════════╝

Python CLI

python serial_terminal.py -p <port>

Planned Features

  1. SAE Attacks: SAE security analysis
  2. WPA3 Support: Enhanced security protocol support
  3. Automated Reporting: Generate PDF reports of findings