Open-source penetration testing firmware for Espressif ESP32. Wi-Fi attacks, BLE scanning, IR capture, RFID cloning — all in one device.
Select your board, connect via USB, and follow the prompts.
Works in Chrome and Edge — no drivers needed.
Capabilities
Deauth attacks, beacon flood, probe and beacon sniffer and passive packet capture on 2.4 GHz networks.
Bluetooth Low Energy scanner and advertiser. Only Applejuice exploit is available right now.
Infrared signal capture and replay. Record any IR remote and retransmit at will — TVs, ACs, projectors.
Read and emulate low-frequency RFID cards. Supports common 125 kHz protocols used in access control systems.
Onboard LittleFS filesystem for storing captured data, scripts, and config — all persisted across reboots.
Hardware
Getting Started
Grab the latest firmware.bin from the Releases page on GitHub.
Run pip install esptool to get the official Espressif flashing utility.
Connect ESP32 via USB, then run:
esptool.py --port COM3 write_flash 0x0 firmware.bin
Replace COM3 with your port (/dev/ttyUSB0 on Linux/macOS).
After reboot, connect to the KFW access point or open the serial monitor at 115200 baud to get started.