ESP32-DIV
→ View on GitHubAI Summary: ESP32-DIV is an open-source multi-band wireless toolkit based on the ESP32, designed for wireless testing, signal analysis, jammer development, and protocol spoofing across Wi-Fi, BLE, 2.4GHz, and Sub-GHz frequency bands. Notable features include real-time packet monitoring, Wi-Fi deauthentication attacks, Bluetooth advertisement spoofing, and Sub-GHz command replay capabilities. The toolkit is intended strictly for educational and research purposes to ensure ethical usage in wireless security assessments.
README
📖 Explore the ESP32-DIV Wiki
Complete project story, in-depth tutorials, and all the features in Wiki! From Wi-Fi deauthentication attacks to Sub-GHz signal replay, the Wiki covers everything you need to get started. Click here to explore now!
:star2: About the Project
Welcome to ESP32DIV, a powerful open-source multi-band wireless toolkit built on the ESP32!
This device supports Wi-Fi, BLE, 2.4GHz, and Sub-GHz frequency bands and is designed for wireless testing, signal analysis, jammer development, and protocol spoofing.
⚠️ This project is intended for educational and research purposes only. Do not use it for malicious activities or unauthorized access.
:dart: Features
📡 Wi-Fi Tools
- Packet Monitor – Real-time waterfall graph of all 14 Wi-Fi channels
- Beacon Spammer – Broadcast fake SSIDs (custom or random)
- Deauth Detector – Monitor for Wi-Fi deauthentication attacks
- Wi-Fi Scanner – List nearby Wi-Fi networks with extended details
- Wi-Fi Deauthentication Attack - Send deauthentication frames to disrupt client connections
- Captive Portal - ESP32 runs as AP + DNS + web server. Clone networks, force sign-in pages, all before HTTPS/authentication
🔵 Bluetooth Tools
- BLE Jammer – Disrupt BLE and classic Bluetooth channels
- BLE Spoofer – Broadcast fake BLE advertisements
- Sour Apple – Spoof Apple BLE advertisements (e.g., AirDrop)
- BLE Scanner – Scan for hidden and visible BLE devices
- BLE Sniffer - Scans BLE advertisements, tracking MAC, RSSI, packet count, and last-seen time. Suspicious devices are highlighted
- BLE Rubber Ducky - Acts as a BLE keyboard and executes SD card scripts. Keys are released and advertising stops on exit
📶 2.4GHz Tools
- 2.4GHz Scanner – Spectrum analyzer for 128 channels (Zigbee, custom RF, etc.)
- Protokill – Disrupt Zigbee, Wi-Fi, and other 2.4GHz protocols
📻 Sub-GHz Tools
- Replay Attack – Capture and replay Sub-GHz commands (e.g., door remotes)
- Sub-GHz Jammer – Disrupt Sub-GHz communication across various bands
- Saved Profiles – Store and manage captured signal profiles
📺 Infrared (IR) Tools
- IR Replay Attack - Capture real IR remote presses, visualize, replay, and save to SD
- IR Saved Profiles - Browser for IR captures, preserving signal and carrier frequency for accurate retransmission
ESP32-DIV v2 |
ESP32-DIV Beta | ESP32-DIV v1 |
🔧 Hardware Overview
ESP32DIV consists of two boards:
🧠 Main Board
- ESP32-S3 – Main microcontroller with Wi-Fi and BLE
- ILI9341 TFT Display – 2.8" UI display
- LF33 – 3.3V regulator
- IP5306 – Lithium battery charging and protection
- CP2102 – USB to serial for flashing
- PCF8574 – I/O expander for buttons
- SD Card Slot – Stores logs and captured signals
- Push Buttons – Navigation and interaction
- Antenna Connector – External antenna support
- WS2812 NeoPixels - Giving better feedback
- Buzzer - It shares a GPIO with the battery voltage divider, so using it is optional.
🛡️ Shield
- 3x NRF24 Modules – 2.4GHz jamming and spoofing
- 1x CC1101 Module – Sub-GHz jamming and replay
- Multiple antennas
- Infrared
ESP32-DIV v2 Main Board | ESP32-DIV v2 Shield |
ESP32-DIV v1 Main Board | ESP32-DIV v1 Shield |
:warning: License
Distributed under the MIT License. See LICENSE.txt for more information.
📎 Resources
:handshake: Contact
▶ Support me on Patreon patreon.com/cifertech
CiferTech - @twitter - CiferTech@gmali.com
Project Link: https://github.com/cifertech/ESP32-DIV
💬 Support & Contributions
- 💬 Found a bug or have a feature request? Open an Issue
- ⭐ Like the project? Star the repo!
- 🛠 Want to contribute? Fork it and submit a pull request.