-
Notifications
You must be signed in to change notification settings - Fork 12
Home
Dominik edited this page Mar 23, 2026
·
28 revisions
is an offensive and research framework for ESP32-C5 with optional Flipper Zero integration.
Hybrid Wi-Fi Offensive & Research Framework
Evil Twin • WPA3 SAE Overflow • Handshake Capture • Beacon Spam • Wardriving • Sniffer • Karma
Powered by ESP32-C5 | Optional control via Flipper Zero
ProjectZero is a modular Wi-Fi offensive and research toolkit for ESP32-C5 platforms.
Interface and control workflow depend on your selected hardware path.
| Attack | Name | Description |
|---|---|---|
| ⚡️ | Deauthentication | Multi-channel deauth, 5GHz support, ultra-fast |
| 👾 | Evil Twin | Fake AP, captive portal, credential capture, password verify |
| 👾 | Phishing Portal | Portable captive portal with live credential harvesting |
| 🔥 | WPA3 SAE Overflow | Commit frame flood, router DDoS, blocks new connections |
| 🤝 | Handshaker | WPA handshake capture with validation and automatic PCAP save |
| 📢 | Beacon Spam | Fake SSID broadcasting, including launch from saved SSID lists |
| 🛜 | Rogue AP | WPA2 rogue access point with captive portal and credential collection |
| 📡 | Wardriving | GPS logging, SD storage, WiGLE-compatible format |
| 🛰️ | Sniffer | Passive listener: AP ⇄ STA, probes, connection insight |
| 🕵️ | Blackout / SnifferDog | Persistent chaos mode, probe hunting |
| 🦾 | Karma Attack | Clone probe requests, automated social engineering |
| 📁 | MITM | Radio/network packet capture to SD card for later analysis |
-
/lab/htmls/– captive portal HTML templates used by Evil Twin / Portal / Rogue AP flows. -
/lab/white.txt- whitelist BSSIDs (colon or dash separated) respected by Blackout and Sniffer Dog. -
/lab/wardrives/wXXXX.log- Wigle-compatible wardrive logs incremented automatically. -
/lab/wigle.txt- WiGLE API credentials loaded on boot in format api_name:api_token (single line, no quotes), e.g. your_wigle_user:your_wigle_api_token. -
/lab/htmls/*.html- captive portal templates discovered by list_sd. -
/lab/portals.txt- persistent CSV-like log of every POST field the captive portal receives. -
/lab/ssid.txt- SSID name list used by Beacon Spam menu mode. -
/lab/oui_wifi.bin- vendor lookup table streamed on demand.
- ⚔️ Attacks – all attacks in one place
- ⚙️ ESP32-C5 CLI – command-line workflow and control
- 🔌 Flashing – firmware installation & setup
- ❓ FAQ – common issues and troubleshooting
ProjectZero is an offensive security research tool.
Use it only on networks you own or are authorized to test.