Skip to content
Dominik edited this page Mar 23, 2026 · 28 revisions

ProjectZero – ESP32-C5 + Flipper Zero Edition

is an offensive and research framework for ESP32-C5 with optional Flipper Zero integration.

IMG_5761

Hybrid Wi-Fi Offensive & Research Framework
Evil Twin • WPA3 SAE Overflow • Handshake Capture • Beacon Spam • Wardriving • Sniffer • Karma
Powered by ESP32-C5 | Optional control via Flipper Zero

ProjectZero is a modular Wi-Fi offensive and research toolkit for ESP32-C5 platforms.

⚠️ Core firmware and attack logic remain unchanged.
Interface and control workflow depend on your selected hardware path.


🚀 Features

Attack Name Description
⚡️ Deauthentication Multi-channel deauth, 5GHz support, ultra-fast
👾 Evil Twin Fake AP, captive portal, credential capture, password verify
👾 Phishing Portal Portable captive portal with live credential harvesting
🔥 WPA3 SAE Overflow Commit frame flood, router DDoS, blocks new connections
🤝 Handshaker WPA handshake capture with validation and automatic PCAP save
📢 Beacon Spam Fake SSID broadcasting, including launch from saved SSID lists
🛜 Rogue AP WPA2 rogue access point with captive portal and credential collection
📡 Wardriving GPS logging, SD storage, WiGLE-compatible format
🛰️ Sniffer Passive listener: AP ⇄ STA, probes, connection insight
🕵️ Blackout / SnifferDog Persistent chaos mode, probe hunting
🦾 Karma Attack Clone probe requests, automated social engineering
📁 MITM Radio/network packet capture to SD card for later analysis

💾 SD Card Files

Zrzut ekranu 2026-03-23 o 21 12 53
  • /lab/htmls/ – captive portal HTML templates used by Evil Twin / Portal / Rogue AP flows.
  • /lab/white.txt - whitelist BSSIDs (colon or dash separated) respected by Blackout and Sniffer Dog.
  • /lab/wardrives/wXXXX.log - Wigle-compatible wardrive logs incremented automatically.
  • /lab/wigle.txt - WiGLE API credentials loaded on boot in format api_name:api_token (single line, no quotes), e.g. your_wigle_user:your_wigle_api_token.
  • /lab/htmls/*.html - captive portal templates discovered by list_sd.
  • /lab/portals.txt - persistent CSV-like log of every POST field the captive portal receives.
  • /lab/ssid.txt - SSID name list used by Beacon Spam menu mode.
  • /lab/oui_wifi.bin - vendor lookup table streamed on demand.

🧭 Wiki Navigation

  • ⚔️ Attacks – all attacks in one place
  • ⚙️ ESP32-C5 CLI – command-line workflow and control
  • 🔌 Flashing – firmware installation & setup
  • FAQ – common issues and troubleshooting

🛡️ Disclaimer

ProjectZero is an offensive security research tool.

Use it only on networks you own or are authorized to test.

Clone this wiki locally