ESP32-DIV is a versatile open-source multi-band wireless testing toolkit built on the ESP32, enabling advanced wireless monitoring, jamming, and protocol spoofing across Wi-Fi, BLE, 2.4GHz, and Sub-GHz bands.
ESP32DIV is a dual-purpose wireless testing toolkit powered by an ESP32
ESP32-DIV is designed for security researchers, wireless engineers, and hobbyists to perform wireless testing, signal analysis, and protocol exploitation in educational and research environments. It allows users to monitor wireless traffic, detect intrusions like deauthentication attacks, and conduct controlled jamming and spoofing attacks to evaluate network resilience and security.
This tool is intended strictly for educational and research purposes; unauthorized use or malicious activities are prohibited. Users should ensure compliance with local laws and regulations regarding wireless testing and signal interference. Proper hardware setup and familiarity with ESP32 development environment are prerequisites for effective use.
Clone the repository from GitHub: git clone https://github.com/cifertech/ESP32-DIV.git
Install ESP-IDF development environment as required for ESP32 programming
Follow the detailed setup and build instructions in the ESP32-DIV Wiki for flashing the firmware
Use compatible hardware (ESP32 board) to flash the compiled firmware
Refer to the Wiki for configuring wireless interfaces and tool features
Wi-Fi Packet Monitor
Displays a real-time waterfall graph of Wi-Fi traffic across all 14 channels.
Beacon Spammer
Broadcasts fake or custom SSIDs to simulate rogue access points.
Deauth Detector
Monitors and alerts on Wi-Fi deauthentication attacks in the vicinity.
Wi-Fi Deauthentication Attack
Sends deauthentication frames to disconnect clients from Wi-Fi networks.
BLE Jammer
Disrupts Bluetooth Low Energy and classic Bluetooth communications.
BLE Spoofer
Broadcasts fake BLE advertisements, including Apple-specific spoofing (Sour Apple).
2.4GHz Scanner
Performs spectrum analysis on 128 channels including Zigbee and custom RF protocols.
Replay Attack (Sub-GHz)
Captures and replays Sub-GHz signals such as remote control commands.
Sub-GHz Jammer
Disrupts communication across various Sub-GHz frequency bands.