ESP32 · PENTEST FIRMWARE

KFW

Open-source penetration testing firmware for Espressif ESP32. Wi-Fi attacks, BLE scanning, IR capture, RFID cloning — all in one device.

Flash Now View Source

One-click Flash

Select your board, connect via USB, and follow the prompts.
Works in Chrome and Edge — no drivers needed.

Requires Chrome or Edge with Web Serial API support

Capabilities

What KFW can do

📡

Wi-Fi

Deauth attacks, beacon flood, probe and beacon sniffer and passive packet capture on 2.4 GHz networks.

🔵

BLE

Bluetooth Low Energy scanner and advertiser. Only Applejuice exploit is available right now.

🔴

IR

Infrared signal capture and replay. Record any IR remote and retransmit at will — TVs, ACs, projectors.

💳

RFID

Read and emulate low-frequency RFID cards. Supports common 125 kHz protocols used in access control systems.

📁

Files

Onboard LittleFS filesystem for storing captured data, scripts, and config — all persisted across reboots.

Hardware

Target platform

BoardESP32 / S3 / C3
ChipEspressif ESP32
FrameworkArduino
Flash toolWeb Serial
FilesystemLittleFS
LicenseOpen Source

Getting Started

Manual installation

01

Download firmware

Grab the latest firmware.bin from the Releases page on GitHub.

02

Install esptool

Run pip install esptool to get the official Espressif flashing utility.

03

Flash the board

Connect ESP32 via USB, then run:
esptool.py --port COM3 write_flash 0x0 firmware.bin
Replace COM3 with your port (/dev/ttyUSB0 on Linux/macOS).

04

Connect & explore

After reboot, connect to the KFW access point or open the serial monitor at 115200 baud to get started.