Convert Figma logo to code with AI

SpacehuhnTech logoesp8266_deauther

Affordable WiFi hacking platform for testing and learning

14,574
2,755
14,574
92

Top Related Projects

Creates up to a thousand WiFi access points with custom SSIDs.

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

The Rogue Access Point Framework

This is a multi-use bash script for Linux systems to audit wireless networks.

Quick Overview

The esp8266_deauther project is a firmware for ESP8266 devices that allows users to perform various Wi-Fi attacks, including deauthentication and beacon flooding. It provides a web interface and a display interface for easy control and monitoring of attack operations.

Pros

  • Easy to use with a user-friendly web interface and display support
  • Supports multiple attack types, including deauthentication, beacon flooding, and probe request flooding
  • Highly customizable with various settings and options
  • Active community and ongoing development

Cons

  • Potential for misuse and illegal activities if not used responsibly
  • May interfere with legitimate Wi-Fi networks and devices
  • Limited to ESP8266 hardware
  • Requires some technical knowledge to set up and use effectively

Getting Started

  1. Download the latest release from the GitHub repository.
  2. Flash the firmware to your ESP8266 device using a tool like esptool or the Arduino IDE.
  3. Connect to the ESP8266's Wi-Fi network (default SSID: pwned).
  4. Access the web interface at 192.168.4.1 or use the display interface if available.
  5. Scan for networks and devices, then select targets for attacks.
  6. Configure attack settings and start the desired attack.

Note: Always ensure you have permission to test on the target network and comply with local laws and regulations.

Competitor Comparisons

Creates up to a thousand WiFi access points with custom SSIDs.

Pros of esp8266_beaconSpam

  • Simpler and more focused functionality, specifically for beacon spamming
  • Lighter codebase, potentially easier to understand and modify
  • May consume less resources on the ESP8266 due to its specialized nature

Cons of esp8266_beaconSpam

  • Limited feature set compared to the more comprehensive esp8266_deauther
  • Less active development and community support
  • Lacks the user interface and advanced options present in esp8266_deauther

Code Comparison

esp8266_beaconSpam:

void loop() {
  if (currentTime - attackTime > 100) {
    attackTime = currentTime;
    wifi_send_pkt_freedom(packet, packetSize, 0);
    packetCounter++;
  }
}

esp8266_deauther:

void loop() {
  currentTime = millis();
  wifiUpdate();
  attack.update();
  displayUI.update();
  cli.update();
  serialInterface.update();
}

The esp8266_beaconSpam code focuses solely on sending beacon packets, while esp8266_deauther's loop handles multiple components, including attacks, UI updates, and command-line interface interactions. This reflects the broader functionality and more complex architecture of esp8266_deauther compared to the simpler, single-purpose esp8266_beaconSpam.

Pros of krackattacks-scripts

  • Focuses on demonstrating and testing the KRACK (Key Reinstallation Attack) vulnerability in WPA2
  • Provides a comprehensive set of scripts for various aspects of KRACK attacks
  • Useful for security researchers and network administrators to assess vulnerabilities

Cons of krackattacks-scripts

  • Requires more technical expertise to set up and use effectively
  • Limited to KRACK-specific attacks, less versatile for general Wi-Fi testing
  • May require additional hardware for certain tests

Code Comparison

krackattacks-scripts (Python):

def replay_broadcast(p):
    sendp(p, iface=interface, verbose=False)
    global num_pkts_sent
    num_pkts_sent += 1

esp8266_deauther (C++):

bool Attack::deauthDevice(uint8_t* apMac, uint8_t* stMac, uint8_t reason, uint8_t channel) {
    if (!stMac) return false;
    mac_set(deauthPacket, 3, stMac);
    mac_set(deauthPacket, 4, apMac);
    deauthPacket[22] = reason;
    return wifi_send_pkt_freedom(deauthPacket, 26, 0) == 0;
}

The krackattacks-scripts code focuses on packet replay for KRACK attacks, while esp8266_deauther implements deauthentication functionality for Wi-Fi networks. The esp8266_deauther code is more hardware-specific, designed for ESP8266 devices, while krackattacks-scripts is more general-purpose and can be run on various systems with the right setup.

Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.

Pros of eaphammer

  • More comprehensive toolkit for targeted evil twin attacks
  • Supports advanced features like hostile portal attacks and captive portal cloning
  • Better suited for penetration testing and security assessments

Cons of eaphammer

  • Requires more setup and dependencies compared to esp8266_deauther
  • Less portable, as it's not designed for embedded systems like ESP8266
  • May have a steeper learning curve for beginners

Code Comparison

eaphammer (Python):

def get_hostapd_command(self):
    command = 'hostapd {}'.format(self.hostapd_conf_path)
    if self.debug:
        return command
    return command + ' > /dev/null 2>&1'

esp8266_deauther (C++):

void Attack::start(uint8_t mode) {
    stop();
    attackMode = mode;
    if (attackMode == ATTACK_BEACON_SPAM) startBeaconSpam();
    else if (attackMode == ATTACK_DEAUTH) startDeauth();
    else if (attackMode == ATTACK_PROBE) startProbe();
}

The code snippets show that eaphammer uses Python and focuses on configuring hostapd for creating access points, while esp8266_deauther uses C++ and implements various attack modes directly on the ESP8266 hardware.

The Rogue Access Point Framework

Pros of wifiphisher

  • More comprehensive attack framework with multiple phishing scenarios
  • Supports a wider range of wireless adapters and operating systems
  • Actively maintained with regular updates and community contributions

Cons of wifiphisher

  • Requires more setup and dependencies compared to esp8266_deauther
  • May be more complex for beginners to use effectively
  • Lacks the portability and low-cost hardware option of esp8266_deauther

Code Comparison

esp8266_deauther (Arduino-based):

void loop() {
  attack.update();
  cli.update();
  display.update();
  led.update();
}

wifiphisher (Python-based):

def start(self):
    self.network_manager.start()
    self.template_manager.start()
    self.access_point.start()
    self.phishinghttp.start()

Both projects use different programming languages and approaches. esp8266_deauther is designed for embedded systems, while wifiphisher is a more traditional software application. The code snippets show the main loop structure for esp8266_deauther and the start method for wifiphisher, highlighting their different architectures and functionalities.

This is a multi-use bash script for Linux systems to audit wireless networks.

Pros of airgeddon

  • More comprehensive suite of wireless auditing tools
  • Supports a wider range of wireless attacks and techniques
  • Actively maintained with frequent updates and community support

Cons of airgeddon

  • Requires more setup and dependencies compared to esp8266_deauther
  • Less portable, as it's not designed for embedded hardware like ESP8266
  • Steeper learning curve for beginners

Code Comparison

esp8266_deauther (Arduino-based):

void loop() {
  ArduinoOTA.handle();
  attack.update();
  cli.update();
  display.update();
  led.update();
}

airgeddon (Bash-based):

function main_menu() {
    clear
    language_strings "${language}" 101 "title"
    current_menu="main_menu"
    initialize_menu_and_print_selections
    echo
    language_strings "${language}" 47 "green"
}

The code snippets highlight the different approaches: esp8266_deauther uses Arduino's loop structure for continuous execution, while airgeddon employs Bash functions for menu-driven operation. This reflects their distinct architectures and target platforms.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

ESP8266 Deauther

Deauther Logo

Scan for WiFi devices, block selected connections, create dozens of networks and confuse WiFi scanners.

New Documentation

Hi 👋
Please visit Deauther.com for information about this project.
Here are some quick links:

Password

The password for pwned is deauther

About this Project

This firmware allows you to easily perform a variety of actions to test 802.11 networks using an ESP8266. It's also a great project for learning about WiFi, microcontrollers, Arduino, hacking and electronics/programming in general.

The deauthentication attack is the main feature, which can be used to disconnect devices from their WiFi network.
Although this denial-of-service attack is nothing new, a lot of devices are still vulnerable to it. Luckily this is slowly changing with more WiFi 6 enabled devices being used. But a lot of outdated WiFi devices remain in place, for example in cheap IoT hardware. With an ESP8266 Deauther, you can easily test this attack on your 2.4GHz WiFi network/devices and see whether it's successful or not. And if it is, you know you should upgrade your network.

Disclaimer

This project is a proof of concept for testing and educational purposes.
Neither the ESP8266, nor its SDK was meant or built for such purposes. Bugs can occur!

Use it only against your own networks and devices!
Please check the legal regulations in your country before using it.
We don't take any responsibility for what you do with this program.