I’m Cifer, and after months of anticipation, I’m finally ready to introduce you to the ESP32DIV—an upgraded version of my original project that has been years in the making. If you’re excited about wireless tech, cybersecurity, and open-source hardware, then this is the project for you! Today, I’ll walk you through all the new features and the hardware behind this amazing device.
🔥 The ESP32DIV Evolution
The ESP32DIV project originally started a few years ago. You all loved the first version, but compared to the new iteration, that one was like a “kindergarten project.” The new version is packed with upgrades and is much more powerful. While the old version only supported Wi-Fi and BLE, the ESP32DIV now has support for 2.4GHz and Sub-GHz frequencies, expanding its capabilities beyond what we originally imagined.
You might be wondering about the name—ESP32DIV. The “ESP32” part is obvious, but “DIV” comes from Persian mythology. In Persian culture, div refers to a supernatural being or demon—powerful and often associated with chaos and evil. It’s a fitting name for a tool that disrupts and manipulates wireless signals!
🌐 Exploring the Features
Let’s dive into the features that make the ESP32DIV so special. I’ve split the functionalities into several menus, each offering a unique set of tools for wireless manipulation and analysis.
Wi-Fi Menu: • Packet Monitor: The Packet Monitor displays live traffic across all 14 Wi-Fi channels, visualized as a waterfall graph. This feature gives you real-time insight into what’s happening in your Wi-Fi environment.
• Beacon Spammer: This tool sends out fake Wi-Fi access points (beacon frames) to flood the airwaves. You can use it to disrupt connections, confuse nearby devices, or even trick users into connecting to fake networks. It offers two options: one that targets specific access points with custom names, and another that generates random fake networks.
• Deauth Detector: This feature scans for deauthentication attacks and other suspicious activity. Originally focused on detecting deauth attacks, it has evolved into a more general-purpose threat detection tool.
• Wi-Fi Scanner: The Wi-Fi Scanner provides a full list of nearby Wi-Fi networks along with detailed information about each one. It's perfect for network analysis or security assessments.
Bluetooth Menu: • BLE Jammer: The BLE Jammer floods Bluetooth Low Energy (BLE) advertising channels with noise, making it harder for devices to discover or connect to each other. It also supports classic Bluetooth channels.
• BLE Spoofer: The BLE Spoofer mimics real BLE devices by sending fake advertising packets. You can impersonate specific devices and launch spoofing operations to test how other devices respond to fake signals.
• Sour Apple: Designed for Apple devices, the Sour Apple tool exploits BLE features like AirDrop and Continuity. It spoofs Apple BLE advertisements to trigger unintended behaviors or potentially cause data leaks.
• BLE Scanner: This tool scans for nearby BLE devices, even those normally hidden from your phone or laptop. You’ll receive detailed information on each device, making it great for analysis or security research.
2.4GHz Menu: • 2.4GHz Scanner: This scans the entire 2.4GHz spectrum across 128 channels, enabling detection of a variety of wireless protocols—not just Wi-Fi and Bluetooth. It’s especially useful for spotting Zigbee networks or proprietary RF protocols operating in the same frequency range.
• Protokill: Protokill lets you jam different wireless protocols on the 2.4GHz band, including Zigbee and Wi-Fi. It’s perfect for stress testing protocols and conducting specific jamming operations.
Sub-GHz Menu: • Replay Attack: Capture a signal (such as a door unlock command) and replay it to gain unauthorized access. This tool allows you to store and replay captured...
Read more »